mattjay
  • Home
  • About
  • Newsletter
  • Blog

Announcements 1

Check out the latest posts
Vulnerable U - Finding Strength in Weakness
Vulnerable-U Newsletter Announcements

Vulnerable U - Finding Strength in Weakness

Exciting news - I’ve started a weekly newsletter (and maybe some other fun stuff to go with it) - You can find the link to subscribe in the sidebar. I’m cross posting the welcome note from Vulnerable U here: Welcome to Vulnerable U, a newsletter...

Biden-administration 1

Check out the latest posts
Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security
cloud-providers data-security Biden-administration cloud-regulation

Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security

You ever look up and wondered how all that water stays up there without crashing down on us? It turns out the Internet is a series of tubes and they’re holding much more than just water. Cloud providers like Amazon, Microsoft, and Google store mas...

Newsletter 1

Check out the latest posts
Vulnerable U - Finding Strength in Weakness
Vulnerable-U Newsletter Announcements

Vulnerable U - Finding Strength in Weakness

Exciting news - I’ve started a weekly newsletter (and maybe some other fun stuff to go with it) - You can find the link to subscribe in the sidebar. I’m cross posting the welcome note from Vulnerable U here: Welcome to Vulnerable U, a newsletter...

SOAR 1

Check out the latest posts
Collaborative Incident Response Best Practices: Don't Rely on Superheroes
incident-response cybersecurity SOAR best-practices resilience

Collaborative Incident Response Best Practices: Don't Rely on Superheroes

Collaborative Incident Response Best Practices: Don’t Rely on Superheroes It’s more important than ever for organizations to have an effective incident response team. However, many are relying on a few individuals with specialized knowledge who a...

Vulnerable-U 1

Check out the latest posts
Vulnerable U - Finding Strength in Weakness
Vulnerable-U Newsletter Announcements

Vulnerable U - Finding Strength in Weakness

Exciting news - I’ve started a weekly newsletter (and maybe some other fun stuff to go with it) - You can find the link to subscribe in the sidebar. I’m cross posting the welcome note from Vulnerable U here: Welcome to Vulnerable U, a newsletter...

ai 1

Check out the latest posts
Best of AI Security 2023
cybersecurity ai

Best of AI Security 2023

The first annual best of AI security project

best-practices 2

Check out the latest posts
Artisanal vs. Industrial Cybersecurity: A Commentary on Phil Venables' Insights
cybersecurity best-practices

Artisanal vs. Industrial Cybersecurity: A Commentary on Phil Venables' Insights

A deep dive into the insightful post by Phil Venables on the transition from artisanal to industrial approaches in cybersecurity.

Collaborative Incident Response Best Practices: Don't Rely on Superheroes
incident-response cybersecurity SOAR best-practices resilience

Collaborative Incident Response Best Practices: Don't Rely on Superheroes

Collaborative Incident Response Best Practices: Don’t Rely on Superheroes It’s more important than ever for organizations to have an effective incident response team. However, many are relying on a few individuals with specialized knowledge who a...

career 5

Check out the latest posts
The Importance of Mentorship in Supporting Mental Health
mental-health cybersecurity career

The Importance of Mentorship in Supporting Mental Health

I was fortunate to have incredible mentors. I encourage you to find the same. Here's why.

Engineer vs. Shepherd
cybersecurity career leadership

Engineer vs. Shepherd

Breaking down leadership archetypes in infosec

Cultivating an Inclusive Infosec Community: Empowering Veterans to Foster Newcomer Success
cybersecurity career

Cultivating an Inclusive Infosec Community: Empowering Veterans to Foster Newcomer Success

Looking to the existing community to create an environment for newcomers to thrive

Exaggerate the Basics
cybersecurity career growth

Exaggerate the Basics

A lesson I learned from a Volleyball coach years ago and how it applies to my career and my life

Finding Your Moat
cybersecurity career growth

Finding Your Moat

Learning about moats in the investment world and how to apply that topic to setting yourself apart in your career

cloud-providers 1

Check out the latest posts
Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security
cloud-providers data-security Biden-administration cloud-regulation

Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security

You ever look up and wondered how all that water stays up there without crashing down on us? It turns out the Internet is a series of tubes and they’re holding much more than just water. Cloud providers like Amazon, Microsoft, and Google store mas...

cloud-regulation 1

Check out the latest posts
Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security
cloud-providers data-security Biden-administration cloud-regulation

Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security

You ever look up and wondered how all that water stays up there without crashing down on us? It turns out the Internet is a series of tubes and they’re holding much more than just water. Cloud providers like Amazon, Microsoft, and Google store mas...

current-events 1

Check out the latest posts
A Discussion on Privacy, DNA, and What it Means to Get Hacked
privacy current-events

A Discussion on Privacy, DNA, and What it Means to Get Hacked

Should we give our DNA to private companies? Is credential stuffing a data breach?

cybersecurity 21

Check out the latest posts
The Importance of Mentorship in Supporting Mental Health
mental-health cybersecurity career

The Importance of Mentorship in Supporting Mental Health

I was fortunate to have incredible mentors. I encourage you to find the same. Here's why.

Best of AI Security 2023
cybersecurity ai

Best of AI Security 2023

The first annual best of AI security project

Resilience
cybersecurity growth

Resilience

Navigating Challenges with Emotional Agility

Loneliness Epidemic
cybersecurity growth

Loneliness Epidemic

Confronting the Isolation of the Infosec Community

Systems not Goals
cybersecurity growth

Systems not Goals

Ditching the Goal Obsession for a System-Led Security Revolution

Getting Hacked Slowly
cybersecurity

Getting Hacked Slowly

The Subtle Erosion of Cybersecurity Hygeine

Overcoming Security Obstructionism
cybersecurity

Overcoming Security Obstructionism

Why We're Our Own Worst Enemy in InfoSec

Engineer vs. Shepherd
cybersecurity career leadership

Engineer vs. Shepherd

Breaking down leadership archetypes in infosec

Cultivating an Inclusive Infosec Community: Empowering Veterans to Foster Newcomer Success
cybersecurity career

Cultivating an Inclusive Infosec Community: Empowering Veterans to Foster Newcomer Success

Looking to the existing community to create an environment for newcomers to thrive

Threat Modeling Depression: Part Two - Attack Tree
cybersecurity mental-health

Threat Modeling Depression: Part Two - Attack Tree

Leveraging more threat modeling techniques to take a critical look at our mental health and our strategies to improve it

7 Ways to Rest & Recover After Socially Exhausting Events
cybersecurity mental-health

7 Ways to Rest & Recover After Socially Exhausting Events

Coming down to Earth and recharging the batteries.

Threat Modeling Depression
cybersecurity mental-health

Threat Modeling Depression

How we can use our skills at threat modeling to look at our mental health through a new lens

The Hidden Battle: Mental Health in Cybersecurity
cybersecurity mental-health

The Hidden Battle: Mental Health in Cybersecurity

How mental health has become a crisis and our industry is finely tuned to perpetuate it

The Growth Mindset Revolution
cybersecurity growth

The Growth Mindset Revolution

How Detaching Identity from Outcomes Can Revolutionize Your Approach to Tech Challenges

Exaggerate the Basics
cybersecurity career growth

Exaggerate the Basics

A lesson I learned from a Volleyball coach years ago and how it applies to my career and my life

Finding Your Moat
cybersecurity career growth

Finding Your Moat

Learning about moats in the investment world and how to apply that topic to setting yourself apart in your career

Privacy vs. Security
cybersecurity privacy

Privacy vs. Security

Balancing Personal Privacy and Professional Life: A Tech Perspective on why security and privacy don't always see eye to eye

The Myth of Arrival
cybersecurity mental-health growth

The Myth of Arrival

Exploring the Concept of Feeling Incomplete Despite Achieving Success

What Are You Avoiding?
cybersecurity mental-health

What Are You Avoiding?

Navigating the Depths of Avoidance in Mental Health and the Tech Industry

Artisanal vs. Industrial Cybersecurity: A Commentary on Phil Venables' Insights
cybersecurity best-practices

Artisanal vs. Industrial Cybersecurity: A Commentary on Phil Venables' Insights

A deep dive into the insightful post by Phil Venables on the transition from artisanal to industrial approaches in cybersecurity.

Collaborative Incident Response Best Practices: Don't Rely on Superheroes
incident-response cybersecurity SOAR best-practices resilience

Collaborative Incident Response Best Practices: Don't Rely on Superheroes

Collaborative Incident Response Best Practices: Don’t Rely on Superheroes It’s more important than ever for organizations to have an effective incident response team. However, many are relying on a few individuals with specialized knowledge who a...

data-security 1

Check out the latest posts
Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security
cloud-providers data-security Biden-administration cloud-regulation

Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security

You ever look up and wondered how all that water stays up there without crashing down on us? It turns out the Internet is a series of tubes and they’re holding much more than just water. Cloud providers like Amazon, Microsoft, and Google store mas...

growth 13

Check out the latest posts
Is Social Media Fueling Anxiety Among Teens?
mental-health growth

Is Social Media Fueling Anxiety Among Teens?

A look at Jonathan Haidt's new book, The Anxious Generation

4 Strategies for Stress Management
mental-health growth

4 Strategies for Stress Management

Beyond the basics of breathwork and exercise, what else can help with the Stress buildup?

The Day I Stopped Fighting Myself and Started Living
mental-health growth

The Day I Stopped Fighting Myself and Started Living

I stopped resisting things I thought were 'wrong' about me and here is what happened

Obsession
growth mindfulness

Obsession

A look into what it means to do what you're obsessed with

The Tech Professional's Guide to Mindfulness
growth mindfulness

The Tech Professional's Guide to Mindfulness

An evidence based approach to starting a mindfulness practice while working in a hectic, digitally connected career

Resilience
cybersecurity growth

Resilience

Navigating Challenges with Emotional Agility

Loneliness Epidemic
cybersecurity growth

Loneliness Epidemic

Confronting the Isolation of the Infosec Community

Systems not Goals
cybersecurity growth

Systems not Goals

Ditching the Goal Obsession for a System-Led Security Revolution

The Art of Strategic Quitting
growth leadership

The Art of Strategic Quitting

Recognizing and Combating the Sunk Cost Bias

The Growth Mindset Revolution
cybersecurity growth

The Growth Mindset Revolution

How Detaching Identity from Outcomes Can Revolutionize Your Approach to Tech Challenges

Exaggerate the Basics
cybersecurity career growth

Exaggerate the Basics

A lesson I learned from a Volleyball coach years ago and how it applies to my career and my life

Finding Your Moat
cybersecurity career growth

Finding Your Moat

Learning about moats in the investment world and how to apply that topic to setting yourself apart in your career

The Myth of Arrival
cybersecurity mental-health growth

The Myth of Arrival

Exploring the Concept of Feeling Incomplete Despite Achieving Success

incident-response 1

Check out the latest posts
Collaborative Incident Response Best Practices: Don't Rely on Superheroes
incident-response cybersecurity SOAR best-practices resilience

Collaborative Incident Response Best Practices: Don't Rely on Superheroes

Collaborative Incident Response Best Practices: Don’t Rely on Superheroes It’s more important than ever for organizations to have an effective incident response team. However, many are relying on a few individuals with specialized knowledge who a...

leadership 2

Check out the latest posts
The Art of Strategic Quitting
growth leadership

The Art of Strategic Quitting

Recognizing and Combating the Sunk Cost Bias

Engineer vs. Shepherd
cybersecurity career leadership

Engineer vs. Shepherd

Breaking down leadership archetypes in infosec

mental-health 11

Check out the latest posts
The Importance of Mentorship in Supporting Mental Health
mental-health cybersecurity career

The Importance of Mentorship in Supporting Mental Health

I was fortunate to have incredible mentors. I encourage you to find the same. Here's why.

The Need for Enforceable Privacy Rights in Mental Health Care
mental-health privacy

The Need for Enforceable Privacy Rights in Mental Health Care

Key word, enforceable. Our regulations need teeth and this is a serious need.

Is Social Media Fueling Anxiety Among Teens?
mental-health growth

Is Social Media Fueling Anxiety Among Teens?

A look at Jonathan Haidt's new book, The Anxious Generation

4 Strategies for Stress Management
mental-health growth

4 Strategies for Stress Management

Beyond the basics of breathwork and exercise, what else can help with the Stress buildup?

The Day I Stopped Fighting Myself and Started Living
mental-health growth

The Day I Stopped Fighting Myself and Started Living

I stopped resisting things I thought were 'wrong' about me and here is what happened

Threat Modeling Depression: Part Two - Attack Tree
cybersecurity mental-health

Threat Modeling Depression: Part Two - Attack Tree

Leveraging more threat modeling techniques to take a critical look at our mental health and our strategies to improve it

7 Ways to Rest & Recover After Socially Exhausting Events
cybersecurity mental-health

7 Ways to Rest & Recover After Socially Exhausting Events

Coming down to Earth and recharging the batteries.

Threat Modeling Depression
cybersecurity mental-health

Threat Modeling Depression

How we can use our skills at threat modeling to look at our mental health through a new lens

The Hidden Battle: Mental Health in Cybersecurity
cybersecurity mental-health

The Hidden Battle: Mental Health in Cybersecurity

How mental health has become a crisis and our industry is finely tuned to perpetuate it

The Myth of Arrival
cybersecurity mental-health growth

The Myth of Arrival

Exploring the Concept of Feeling Incomplete Despite Achieving Success

What Are You Avoiding?
cybersecurity mental-health

What Are You Avoiding?

Navigating the Depths of Avoidance in Mental Health and the Tech Industry

mindfulness 2

Check out the latest posts
Obsession
growth mindfulness

Obsession

A look into what it means to do what you're obsessed with

The Tech Professional's Guide to Mindfulness
growth mindfulness

The Tech Professional's Guide to Mindfulness

An evidence based approach to starting a mindfulness practice while working in a hectic, digitally connected career

privacy 3

Check out the latest posts
The Need for Enforceable Privacy Rights in Mental Health Care
mental-health privacy

The Need for Enforceable Privacy Rights in Mental Health Care

Key word, enforceable. Our regulations need teeth and this is a serious need.

A Discussion on Privacy, DNA, and What it Means to Get Hacked
privacy current-events

A Discussion on Privacy, DNA, and What it Means to Get Hacked

Should we give our DNA to private companies? Is credential stuffing a data breach?

Privacy vs. Security
cybersecurity privacy

Privacy vs. Security

Balancing Personal Privacy and Professional Life: A Tech Perspective on why security and privacy don't always see eye to eye

resilience 1

Check out the latest posts
Collaborative Incident Response Best Practices: Don't Rely on Superheroes
incident-response cybersecurity SOAR best-practices resilience

Collaborative Incident Response Best Practices: Don't Rely on Superheroes

Collaborative Incident Response Best Practices: Don’t Rely on Superheroes It’s more important than ever for organizations to have an effective incident response team. However, many are relying on a few individuals with specialized knowledge who a...

Matt Johansen

Hi, I'm Matt – Friendly Neighborhood Security Guy. I'm a computer security veteran who has helped defend startups, the biggest financial companies in the world, and everything in between.

2024 © mattjay. Published with Jekyll. Crafted & Designed by Artem Sheludko.