{"id":968,"date":"2021-04-17T04:49:59","date_gmt":"2021-04-17T04:49:59","guid":{"rendered":"http:\/\/badbadger.tech\/?page_id=968"},"modified":"2023-11-02T13:59:35","modified_gmt":"2023-11-02T13:59:35","slug":"home","status":"publish","type":"page","link":"https:\/\/badbadger.tech\/","title":{"rendered":""},"content":{"rendered":"\n<h1>\n\t\t\t\t\tData is not at risk from technology&#8230;\n\t\t\t\t<\/h1>\n\t<p>&#8230;it&#8217;s at risk from people. Technology itself is neutral.<\/p>\n<p>This seems obvious but we are getting it wrong all the time and attackers are profiting. We&#8217;re so easily distracted by the shiny objects and expensive toys of InfoSec that we ignore the core principles &#8211; which is what TRULY makes the difference. Technology leaders must get the fundamentals right and develop their defenses in the correct order and in-depth:<\/p>\n<ul>\n<li>the right people &#8211; trained.\n<ul>\n<li>the right processes &#8211; followed.\n<ul>\n<li>the right tools &#8211; funded and well-supported.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>It has to be in that ^ order or none of it will matter.<\/p>\n<p>Welcome to my site. Let&#8217;s talk about it.<\/p>\n\t<h2>\n\t\t\t\t\tTopics I Discuss\n\t\t\t\t<\/h2>\n\t<h6>\n\t\t\t\t\t01.\n\t\t\t\t<\/h6>\n\t<h4>\n\t\t\t\t\tCybersecurity Fundamentals\n\t\t\t\t<\/h4>\n\t<h6>\n\t\t\t\t\t02.\n\t\t\t\t<\/h6>\n\t<h4>\n\t\t\t\t\tThreat Landscape\n\t\t\t\t<\/h4>\n\t<h6>\n\t\t\t\t\t03.\n\t\t\t\t<\/h6>\n\t<h4>\n\t\t\t\t\tSecurity Tools and Techniques\n\t\t\t\t<\/h4>\n\t<h6>\n\t\t\t\t\t04.\n\t\t\t\t<\/h6>\n\t<h4>\n\t\t\t\t\tLeadership\n\t\t\t\t<\/h4>\n\t<h6>\n\t\t\t\t\t05.\n\t\t\t\t<\/h6>\n\t<h4>\n\t\t\t\t\tSelf Improvement\n\t\t\t\t<\/h4>\n\t<h6>\n\t\t\t\t\t06.\n\t\t\t\t<\/h6>\n\t<h4>\n\t\t\t\t\tSecurity Tools and Techniques\n\t\t\t\t<\/h4>\n\t<h6>\n\t\t\t\t\t07.\n\t\t\t\t<\/h6>\n\t<h4>\n\t\t\t\t\tCloud Security\n\t\t\t\t<\/h4>\n\t<h6>\n\t\t\t\t\t08.\n\t\t\t\t<\/h6>\n\t<h4>\n\t\t\t\t\tStuff\n\t\t\t\t<\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Data is not at risk from technology&#8230; &#8230;it&#8217;s at risk from people. Technology itself is neutral. This seems obvious but we are getting it wrong all the time and attackers are profiting. We&#8217;re so easily distracted by the shiny objects and expensive toys of InfoSec that we ignore the core principles &#8211; which is what&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-968","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/badbadger.tech\/index.php?rest_route=\/wp\/v2\/pages\/968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/badbadger.tech\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/badbadger.tech\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/badbadger.tech\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/badbadger.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=968"}],"version-history":[{"count":15,"href":"https:\/\/badbadger.tech\/index.php?rest_route=\/wp\/v2\/pages\/968\/revisions"}],"predecessor-version":[{"id":1172,"href":"https:\/\/badbadger.tech\/index.php?rest_route=\/wp\/v2\/pages\/968\/revisions\/1172"}],"wp:attachment":[{"href":"https:\/\/badbadger.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}