Skip to Content

Infosec Adalid

Cybersecurity: People, Processes, and Technology

Tag: Processes

How to define efficient security processes

Every process has to have an owner. The owner is the person accountable for the success of the process. The owner is not who executes the process. Those who execute the process are the executors.

Continue reading “How to define efficient security processes” →

Posted on September 1, 2021 by Florencio Cano

Most popular posts

  • Containers: Rootful, Rootless, Privileged and Super…
  • My introduction to Z3 and solving satisfiability problems
  • Scanning Dockerfiles for security issues +…
  • Introduction to Landlock
  • Introduction to dependencyCheck: an open source…
  • The value of a pentest

Recent Posts

  • The value of a pentestNovember 25, 2022
  • Off the top of my head: Is availability really a cybersecurity pillar?November 23, 2022
  • Off the top of my head: About having everything green in QualysNovember 23, 2022
  • Information security requirements on the US “Executive Order on Improving the Nation’s Cybersecurity”November 17, 2022
  • How to find OpenSSL in our infrastructureNovember 1, 2022

Archive

  • November 2022
  • April 2022
  • March 2022
  • September 2021
  • August 2021
  • July 2021

Categories

  • Leadership
  • Off the top of my head
  • Security

Florencio Cano.
Principal Product Security Analyst at Red Hat with focus on cloud services.
Former Mercadona CISO.
Opinions expressed are solely my own and do not express the views or opinions of my employer.