The most intelligent people do not have the most expansive sets of knowledge; rather, they know with the greatest precision where their knowledge ends.
This section includes documents that can be read or referenced to increase cybersecurity knowledge and awareness of a variety of security topics but should not be considered comprehensive guides to security, compliance, or privacy. The information contained in this section should only be used for advancement of knowledge or in support of a broader security framework, strategy, and/or plan.
Acquisition Vs. Supply Chain Risk
Threat Scope Maturity: A Look at History
Risk Avoidance: A Lifecycle and an SDLC Integration
Transparency, Privacy & Confidentiality
Paper Lunch Sac Firewalls: Information Security Gear is Not Compliance