top of page
Search


Internet of Things (IoT) — Physical Security
This post is the second in our series on IoT security and privacy. The introductory post is a great starting point — it has an overview...

Cylidify
Apr 19, 20195 min read
Â
Â


Threat Modeling — Team Building
This is the second post in our Threat Modeling series. We recommend reading the "starting out" post first to get a baseline and overview...

Cylidify
Apr 11, 20193 min read
Â
Â


Internet of Things (IoT) Security and Privacy
We've heard a few times that the "S" in IoT stands for Security. It's humorous, but not actually funny given the truth behind it....

Cylidify
Apr 5, 20195 min read
Â
Â


The Difficult and Dynamic CSO Job
Cybersecurity and privacy started with "urgency" in 2019 and are ramping up forcing the corporate owners to work ahead of normal planning...

Cylidify
Mar 29, 20193 min read
Â
Â


An Ounce of (Cybersecurity) Prevention...
Or, your security and privacy needs a toon up... I didn't want to put too much description ahead of the cartoon allowing a reader do the...

Monty LaRue
Mar 21, 20191 min read
Â
Â


Threat Modeling — Starting Out...
[See also the second installment in this series "Threat Modeling - Team Building".] We have mentioned Threat Modeling in many of our...

Monty LaRue
Mar 15, 20194 min read
Â
Â


"Zero" Trust and Boundaries
The concept of "Zero Trust" has been around for a while, but it has been rekindled recently and is trending. This approach has many...

Cylidify
Mar 6, 20193 min read
Â
Â


Left-Shifting — Earlier and More Proactive
I am a fan and advocate of "left-shifting" practices earlier in any process. However, in a Software Development Lifecycle (SDLC) or...

Monty LaRue
Feb 28, 20193 min read
Â
Â


Zen of Venn — DevOps, DevSecOps, and Ops
Like Information Technology (IT) and Agile, the term Operations (Ops) has become overloaded and confusing. We'd argue Ops is Ops, or at...

Cylidify
Feb 20, 20195 min read
Â
Â


Zen of Venn — Static Versus Dynamic Analysis
Cylidify's core tenants feature "balance", "compromise", and "convergence" which are all aspects of a Venn diagram. A Venn with each...

Cylidify
Feb 13, 20193 min read
Â
Â


Minding the Gaps - Cybersecurity:Constituents
Cylidify publishes blog posts to share our ideas and guidance, but also to generally "put ourselves out there". Being direct and candid...

Cylidify
Feb 6, 20193 min read
Â
Â


Ransomware Revisited — Response and Recovery
In part one of this series, we covered the basics of ransomware including its cyclic nature, recent resurgence, and possible evolution...

Cylidify
Jan 30, 20194 min read
Â
Â


Means, Motive, and Opportunity
These three things are what it usually takes to convict someone of a crime, but it's also what is necessary to perpetrate a crime;...

Monty LaRue
Jan 25, 20193 min read
Â
Â


Careers in Cybersecurity and @Cylidify
Hiring and retention is one of the highest priorities at Cylidify - for us and our clients. This post will focus on our career...

Cylidify
Jan 21, 20191 min read
Â


Ransomware Revisited
Ransomware is back in the news, but really, it never left. It has been revisiting again, again, and again. This is a cyclic attack that...

Cylidify
Jan 16, 20194 min read
Â
Â


Hotseat: Cybersecurity
Cybersecurity is pervasive in our daily lives and something all technology businesses should have in their "top 5" priorities. The threat...

Cylidify
Jan 7, 20191 min read
Â


Why Cylidify?
Our founders and principals bring decades of experience providing cybersecurity across industry standards such as the NIST Cybersecurity...

Cylidify
Jan 2, 20191 min read
Â


Core Tenets
At Cylidify, integrity and confidentiality are essential. These traits and the below core tenets are infused into our culture and extend...

Cylidify
Jan 1, 20192 min read
Â


Monty LaRue Joins Cylidify
Monty LaRue has joined Cylidify as a founder providing cybersecurity and technology leadership. Monty has over 25 years of experience in...

Cylidify
Dec 25, 20181 min read
Â


Mike Ellis Incorporates Cylidify, LLC
Starting with an appreciation for the customer need for cybersecurity consulting and services, and after much work and planning, Mike...

Cylidify
Nov 16, 20181 min read
Â
bottom of page


