Open in app

Sign In

Write

Sign In

Mastodon
David Matousek
David Matousek

401 Followers

Home

Lists

About

Published in

Product Cybersecurity

·May 23

“Secure By Design and Default” in Your Cybersecurity Team

What the Three “Secure by Design and Default” Software Product Security Principles Mean for Your Cybersecurity Team Bad security happens because we protect only one attack surface at a time or when a new regulation tells us to. We are “Vulnerable by Design.” (CISA). There is no way we can…

Cybersecurity

8 min read

“Secure By Design and Default” in Your Cybersecurity Team
“Secure By Design and Default” in Your Cybersecurity Team
Cybersecurity

8 min read


Published in

Product Cybersecurity

·Apr 12

Empathy in Cybersecurity, Recognizing “Moments of Truth”

Empathizing with Customers, Developers, and Stakeholders — In cybersecurity, I sometimes forget to put myself in the shoes of my customers. Maybe it’s because I’m busy. Maybe it’s because I’m arrogant. People are the most important resource cybersecurity teams have to identify, protect, detect, respond, and recover from cybersecurity events. Over the weekend, I was reminded that…

Cybersecurity

2 min read

Empathy in Cybersecurity, Recognizing “Moments of Truth”
Empathy in Cybersecurity, Recognizing “Moments of Truth”
Cybersecurity

2 min read


Published in

Product Cybersecurity

·Mar 13

3 Tips for Aligning Business Vision to Cybersecurity Strategy

Leaders want measurable data about cybersecurity’s progress toward creating value aligned to the business vision. They do not necessarily want a bullet list of security checkboxes. Cybersecurity teams have to recognize that strategy needs to support the business. Recently, I’ve seen many product managers talk about being asked for a…

Cybersecurity

6 min read

3 Tips for Aligning Business Vision to Cybersecurity Strategy
3 Tips for Aligning Business Vision to Cybersecurity Strategy
Cybersecurity

6 min read


Published in

Product Cybersecurity

·Dec 6, 2022

5 Reasons Why Product-led Cybersecurity Will Drive Success in 2023

Cybersecurity teams need to look into the mirror and ask, “What do I need to do to be prepared for 2023?” Next year I believe cybersecurity teams will face epic challenges, forcing teams to reevaluate how we operate. Doing security for security’s sake will not be enough to sell business…

Cybersecurity

7 min read

5 Reasons Why Product-led Cybersecurity Will Drive Success in 2023
5 Reasons Why Product-led Cybersecurity Will Drive Success in 2023
Cybersecurity

7 min read


Published in

Product Cybersecurity

·Nov 29, 2022

‘Defense in Layers’ — Zero Trust Applied to Your Cybersecurity Posture

“Defense In Layers” in the Enterprise Part 3 of the series ‘Defense In Layers’. Part 1: ‘Defense In Layers’ The Framework & Part 2: ‘Defense in Layers’ — The Exercise. Please support me by following me on Medium. Cybersecurity teams are being called upon to provide roadmaps to ‘Zero Trust.’…

Cybersecurity

8 min read

‘Defense in Layers’ — Zero Trust Applied to Your Cybersecurity Posture
‘Defense in Layers’ — Zero Trust Applied to Your Cybersecurity Posture
Cybersecurity

8 min read


Published in

Product Cybersecurity

·Sep 27, 2022

‘Defense in Layers’ — The Exercise

Part 2 of the series ‘Defense In Layers’. Link to ‘Defense In Layers’ The Framework. Please support me by following me on Medium. Tap, Tap, Tap. ”Excuse me. Your perceived security posture is not what you think it is….” WHAT? How DARE you. We spend at least 10% of our…

Cybersecurity

8 min read

‘Defense in Layers’ — The Exercise
‘Defense in Layers’ — The Exercise
Cybersecurity

8 min read


Published in

Product Cybersecurity

·Sep 20, 2022

‘Defense in Layers’ — The Enterprise Framework

Article 1 of ‘Defense In Layers’ in the Enterprise As long as there is money to be made from hacking an enterprise, hackers will find new ways to exploit vulnerabilities. Looking into the 2022 Uber hack, a typical story took place. …

Cybersecurity

5 min read

‘Defense in Layers’ — The Enterprise Framework
‘Defense in Layers’ — The Enterprise Framework
Cybersecurity

5 min read


Published in

Product Cybersecurity

·May 5, 2022

Posture Five — Network Security Posture Monitoring using the CIA Triad

Article 7 of 8 in Building Your Cybersecurity Posture on Medium Our network is the map to all of our vulnerabilities. Attackers can use this map to find routes to our most protected assets or find easy locations to hijack data in flight exposing our most valuable information. Our network…

Cybersecurity

5 min read

Posture Five — Network Security Posture Monitoring using the CIA Triad
Posture Five — Network Security Posture Monitoring using the CIA Triad
Cybersecurity

5 min read


Published in

Product Cybersecurity

·Apr 25, 2022

3 Ways a Product-led Cybersecurity Team Accelerates Security

Scaling cyber defense is more than just adding more members to the team. Cybersecurity teams in the enterprise are growing exponentially. Product-led cybersecurity organizations can help do more than show the number of threats averted and vulnerabilities fixed. They can help drive internal adoption and show financial value to executives…

Cybersecurity

4 min read

3 Ways a Product-led Cybersecurity Team Accelerates Security
3 Ways a Product-led Cybersecurity Team Accelerates Security
Cybersecurity

4 min read


Published in

Product Cybersecurity

·Apr 11, 2022

Creating Customer, Developer, & Stakeholder Value in Cybersecurity

One day, after a particularly eventful night, I asked myself, “Is cybersecurity worth doing?” The obvious answer is a resounding “YES!” but out of nowhere, my eight-year-old asks, “Why?” If my eight-year-old daughter sees the need for value at the morning breakfast table, what are business executives asking themselves when…

Cybersecurity

5 min read

Creating Customer, Developer, & Stakeholder Value in Cybersecurity
Creating Customer, Developer, & Stakeholder Value in Cybersecurity
Cybersecurity

5 min read

David Matousek

David Matousek

401 Followers

Cybersecurity Product Manager, Building Better Security for Customers, Developers, & Stakeholders

Following
  • Prof Bill Buchanan OBE

    Prof Bill Buchanan OBE

  • Anton Chuvakin

    Anton Chuvakin

  • Ethan Siegel

    Ethan Siegel

  • A. S. Deller

    A. S. Deller

  • Tim Denning

    Tim Denning

See all (78)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams