mattjay
  • Home
  • About
  • Newsletter
  • Blog

Announcements 1

Check out the latest posts
Vulnerable U - Finding Strength in Weakness
Vulnerable-U Newsletter Announcements

Vulnerable U - Finding Strength in Weakness

Exciting news - I’ve started a weekly newsletter (and maybe some other fun stuff to go with it) - You can find the link to subscribe in the sidebar. I’m cross posting the welcome note from Vulnerable U here: Welcome to Vulnerable U, a newsletter...

Biden-administration 1

Check out the latest posts
Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security
cloud-providers data-security Biden-administration cloud-regulation

Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security

You ever look up and wondered how all that water stays up there without crashing down on us? It turns out the Internet is a series of tubes and they’re holding much more than just water. Cloud providers like Amazon, Microsoft, and Google store mas...

Newsletter 1

Check out the latest posts
Vulnerable U - Finding Strength in Weakness
Vulnerable-U Newsletter Announcements

Vulnerable U - Finding Strength in Weakness

Exciting news - I’ve started a weekly newsletter (and maybe some other fun stuff to go with it) - You can find the link to subscribe in the sidebar. I’m cross posting the welcome note from Vulnerable U here: Welcome to Vulnerable U, a newsletter...

SOAR 1

Check out the latest posts
Collaborative Incident Response Best Practices: Don't Rely on Superheroes
incident-response cybersecurity SOAR best-practices resilience

Collaborative Incident Response Best Practices: Don't Rely on Superheroes

Collaborative Incident Response Best Practices: Don’t Rely on Superheroes It’s more important than ever for organizations to have an effective incident response team. However, many are relying on a few individuals with specialized knowledge who a...

Vulnerable-U 1

Check out the latest posts
Vulnerable U - Finding Strength in Weakness
Vulnerable-U Newsletter Announcements

Vulnerable U - Finding Strength in Weakness

Exciting news - I’ve started a weekly newsletter (and maybe some other fun stuff to go with it) - You can find the link to subscribe in the sidebar. I’m cross posting the welcome note from Vulnerable U here: Welcome to Vulnerable U, a newsletter...

best-practices 2

Check out the latest posts
Artisanal vs. Industrial Cybersecurity: A Commentary on Phil Venables' Insights
cybersecurity best-practices

Artisanal vs. Industrial Cybersecurity: A Commentary on Phil Venables' Insights

A deep dive into the insightful post by Phil Venables on the transition from artisanal to industrial approaches in cybersecurity.

Collaborative Incident Response Best Practices: Don't Rely on Superheroes
incident-response cybersecurity SOAR best-practices resilience

Collaborative Incident Response Best Practices: Don't Rely on Superheroes

Collaborative Incident Response Best Practices: Don’t Rely on Superheroes It’s more important than ever for organizations to have an effective incident response team. However, many are relying on a few individuals with specialized knowledge who a...

career 4

Check out the latest posts
Engineer vs. Shepherd
cybersecurity career leadership

Engineer vs. Shepherd

Breaking down leadership archetypes in infosec

Cultivating an Inclusive Infosec Community: Empowering Veterans to Foster Newcomer Success
cybersecurity career

Cultivating an Inclusive Infosec Community: Empowering Veterans to Foster Newcomer Success

Looking to the existing community to create an environment for newcomers to thrive

Exaggerate the Basics
cybersecurity career growth

Exaggerate the Basics

A lesson I learned from a Volleyball coach years ago and how it applies to my career and my life

Finding Your Moat
cybersecurity career growth

Finding Your Moat

Learning about moats in the investment world and how to apply that topic to setting yourself apart in your career

cloud-providers 1

Check out the latest posts
Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security
cloud-providers data-security Biden-administration cloud-regulation

Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security

You ever look up and wondered how all that water stays up there without crashing down on us? It turns out the Internet is a series of tubes and they’re holding much more than just water. Cloud providers like Amazon, Microsoft, and Google store mas...

cloud-regulation 1

Check out the latest posts
Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security
cloud-providers data-security Biden-administration cloud-regulation

Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security

You ever look up and wondered how all that water stays up there without crashing down on us? It turns out the Internet is a series of tubes and they’re holding much more than just water. Cloud providers like Amazon, Microsoft, and Google store mas...

current-events 1

Check out the latest posts
A Discussion on Privacy, DNA, and What it Means to Get Hacked
privacy current-events

A Discussion on Privacy, DNA, and What it Means to Get Hacked

Should we give our DNA to private companies? Is credential stuffing a data breach?

cybersecurity 19

Check out the latest posts
Resilience
cybersecurity growth

Resilience

Navigating Challenges with Emotional Agility

Loneliness Epidemic
cybersecurity growth

Loneliness Epidemic

Confronting the Isolation of the Infosec Community

Systems not Goals
cybersecurity growth

Systems not Goals

Ditching the Goal Obsession for a System-Led Security Revolution

Getting Hacked Slowly
cybersecurity

Getting Hacked Slowly

The Subtle Erosion of Cybersecurity Hygeine

Overcoming Security Obstructionism
cybersecurity

Overcoming Security Obstructionism

Why We're Our Own Worst Enemy in InfoSec

Engineer vs. Shepherd
cybersecurity career leadership

Engineer vs. Shepherd

Breaking down leadership archetypes in infosec

Cultivating an Inclusive Infosec Community: Empowering Veterans to Foster Newcomer Success
cybersecurity career

Cultivating an Inclusive Infosec Community: Empowering Veterans to Foster Newcomer Success

Looking to the existing community to create an environment for newcomers to thrive

Threat Modeling Depression: Part Two - Attack Tree
cybersecurity mental-health

Threat Modeling Depression: Part Two - Attack Tree

Leveraging more threat modeling techniques to take a critical look at our mental health and our strategies to improve it

7 Ways to Rest & Recover After Socially Exhausting Events
cybersecurity mental-health

7 Ways to Rest & Recover After Socially Exhausting Events

Coming down to Earth and recharging the batteries.

Threat Modeling Depression
cybersecurity mental-health

Threat Modeling Depression

How we can use our skills at threat modeling to look at our mental health through a new lens

The Hidden Battle: Mental Health in Cybersecurity
cybersecurity mental-health

The Hidden Battle: Mental Health in Cybersecurity

How mental health has become a crisis and our industry is finely tuned to perpetuate it

The Growth Mindset Revolution
cybersecurity growth

The Growth Mindset Revolution

How Detaching Identity from Outcomes Can Revolutionize Your Approach to Tech Challenges

Exaggerate the Basics
cybersecurity career growth

Exaggerate the Basics

A lesson I learned from a Volleyball coach years ago and how it applies to my career and my life

Finding Your Moat
cybersecurity career growth

Finding Your Moat

Learning about moats in the investment world and how to apply that topic to setting yourself apart in your career

Privacy vs. Security
cybersecurity privacy

Privacy vs. Security

Balancing Personal Privacy and Professional Life: A Tech Perspective on why security and privacy don't always see eye to eye

The Myth of Arrival
cybersecurity mental-health growth

The Myth of Arrival

Exploring the Concept of Feeling Incomplete Despite Achieving Success

What Are You Avoiding?
cybersecurity mental-health

What Are You Avoiding?

Navigating the Depths of Avoidance in Mental Health and the Tech Industry

Artisanal vs. Industrial Cybersecurity: A Commentary on Phil Venables' Insights
cybersecurity best-practices

Artisanal vs. Industrial Cybersecurity: A Commentary on Phil Venables' Insights

A deep dive into the insightful post by Phil Venables on the transition from artisanal to industrial approaches in cybersecurity.

Collaborative Incident Response Best Practices: Don't Rely on Superheroes
incident-response cybersecurity SOAR best-practices resilience

Collaborative Incident Response Best Practices: Don't Rely on Superheroes

Collaborative Incident Response Best Practices: Don’t Rely on Superheroes It’s more important than ever for organizations to have an effective incident response team. However, many are relying on a few individuals with specialized knowledge who a...

data-security 1

Check out the latest posts
Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security
cloud-providers data-security Biden-administration cloud-regulation

Cloud Providers: Are They Too Big to Fail? The Biden Administration's Plan to Regulate Cloud Security

You ever look up and wondered how all that water stays up there without crashing down on us? It turns out the Internet is a series of tubes and they’re holding much more than just water. Cloud providers like Amazon, Microsoft, and Google store mas...

growth 8

Check out the latest posts
Resilience
cybersecurity growth

Resilience

Navigating Challenges with Emotional Agility

Loneliness Epidemic
cybersecurity growth

Loneliness Epidemic

Confronting the Isolation of the Infosec Community

Systems not Goals
cybersecurity growth

Systems not Goals

Ditching the Goal Obsession for a System-Led Security Revolution

The Art of Strategic Quitting
growth leadership

The Art of Strategic Quitting

Recognizing and Combating the Sunk Cost Bias

The Growth Mindset Revolution
cybersecurity growth

The Growth Mindset Revolution

How Detaching Identity from Outcomes Can Revolutionize Your Approach to Tech Challenges

Exaggerate the Basics
cybersecurity career growth

Exaggerate the Basics

A lesson I learned from a Volleyball coach years ago and how it applies to my career and my life

Finding Your Moat
cybersecurity career growth

Finding Your Moat

Learning about moats in the investment world and how to apply that topic to setting yourself apart in your career

The Myth of Arrival
cybersecurity mental-health growth

The Myth of Arrival

Exploring the Concept of Feeling Incomplete Despite Achieving Success

incident-response 1

Check out the latest posts
Collaborative Incident Response Best Practices: Don't Rely on Superheroes
incident-response cybersecurity SOAR best-practices resilience

Collaborative Incident Response Best Practices: Don't Rely on Superheroes

Collaborative Incident Response Best Practices: Don’t Rely on Superheroes It’s more important than ever for organizations to have an effective incident response team. However, many are relying on a few individuals with specialized knowledge who a...

leadership 2

Check out the latest posts
The Art of Strategic Quitting
growth leadership

The Art of Strategic Quitting

Recognizing and Combating the Sunk Cost Bias

Engineer vs. Shepherd
cybersecurity career leadership

Engineer vs. Shepherd

Breaking down leadership archetypes in infosec

mental-health 6

Check out the latest posts
Threat Modeling Depression: Part Two - Attack Tree
cybersecurity mental-health

Threat Modeling Depression: Part Two - Attack Tree

Leveraging more threat modeling techniques to take a critical look at our mental health and our strategies to improve it

7 Ways to Rest & Recover After Socially Exhausting Events
cybersecurity mental-health

7 Ways to Rest & Recover After Socially Exhausting Events

Coming down to Earth and recharging the batteries.

Threat Modeling Depression
cybersecurity mental-health

Threat Modeling Depression

How we can use our skills at threat modeling to look at our mental health through a new lens

The Hidden Battle: Mental Health in Cybersecurity
cybersecurity mental-health

The Hidden Battle: Mental Health in Cybersecurity

How mental health has become a crisis and our industry is finely tuned to perpetuate it

The Myth of Arrival
cybersecurity mental-health growth

The Myth of Arrival

Exploring the Concept of Feeling Incomplete Despite Achieving Success

What Are You Avoiding?
cybersecurity mental-health

What Are You Avoiding?

Navigating the Depths of Avoidance in Mental Health and the Tech Industry

privacy 2

Check out the latest posts
A Discussion on Privacy, DNA, and What it Means to Get Hacked
privacy current-events

A Discussion on Privacy, DNA, and What it Means to Get Hacked

Should we give our DNA to private companies? Is credential stuffing a data breach?

Privacy vs. Security
cybersecurity privacy

Privacy vs. Security

Balancing Personal Privacy and Professional Life: A Tech Perspective on why security and privacy don't always see eye to eye

resilience 1

Check out the latest posts
Collaborative Incident Response Best Practices: Don't Rely on Superheroes
incident-response cybersecurity SOAR best-practices resilience

Collaborative Incident Response Best Practices: Don't Rely on Superheroes

Collaborative Incident Response Best Practices: Don’t Rely on Superheroes It’s more important than ever for organizations to have an effective incident response team. However, many are relying on a few individuals with specialized knowledge who a...

Matt Johansen

Hi, I'm Matt – Friendly Neighborhood Security Guy. I'm a computer security veteran who has helped defend startups, the biggest financial companies in the world, and everything in between.

2023 © mattjay. Published with Jekyll. Crafted & Designed by Artem Sheludko.