Month: February 2024
I was recently invited to present to security and IT leaders at a vendor’s gathering of small early-stage biotechs. I packaged up a deck with the anatomy of an attack, the NIST CSF process for defense, and our operating model for running a security program, including measures I saw as basic table stakes (anti-malware, email … Read more
Read MoreScene 1: At one time in another “life,” I was hiring developers for a commercial product. We had a candidate who was sharp, if a bit quirky, and, with the agreement of my team, I took the recommendation to my manager (who had interviewed the candidate). His reaction? “Do you really want to hire someone … Read more
Read More