Homepage
Open in app
Sign in
Get started
DayBlink Consulting
The DayBlink Consulting team provides engaging thought leadership in the fields of cybersecurity, applied automation, and management consulting
Cybersecurity
Applied Automation
Management Consulting
DayBlink Consulting
Follow
A Brief Analysis of the Federal Govt’s Guidance on Zero Trust for Data Security
A Brief Analysis of the Federal Govt’s Guidance on Zero Trust for Data Security
The Federal government recently published guidance on implementing a modern Zero Trust Architecture for data security
Jacob Armijo
Nov 12
The Value of Data Doctrines for Data Lake Governance
The Value of Data Doctrines for Data Lake Governance
Data Lakes have become an increasingly popular tool for…
Jordan Brinkman
Aug 28
Should a CISO be Better at Automation than Security?
Should a CISO be Better at Automation than Security?
As the story goes, and more recently popularized in the movie The Founder, Ray Kroc was speaking to a class at Harvard when asked “What…
Justin Whitaker
Feb 1
Industry Evolution of Modern Vulnerability Management
Industry Evolution of Modern Vulnerability Management
Vulnerability Management as a function has been around as long as we’ve had sophisticated IT and security organizations. Yet the overall…
Michael Morgenstern
Dec 27, 2023
Preparing for the American Data Privacy & Protection Act
Preparing for the American Data Privacy & Protection Act
The United States does not have a single comprehensive federal consumer privacy law comparable to the European Union’s…
Jacob Rosner
Dec 21, 2023
The Implications of AI-Assisted Code Development on Risk Management
The Implications of AI-Assisted Code Development on Risk Management
AI-assisted code development (AICD) is a powerful tool that can be leveraged in the DevSecOps cycle to increase code efficiency. However…
Christa Zubic
Dec 20, 2023
Enhancing Supply Chain Efficiency Through JIT & Process Refinements
Enhancing Supply Chain Efficiency Through JIT & Process Refinements
Supply Chain Challenges and the Key Benefits of JIT Practices
Kayla Bennett
Dec 18, 2023
Maximize Impact, Minimize Burden: Making the Case for Rapid-Fire Crown Jewels Assessments
Maximize Impact, Minimize Burden: Making the Case for Rapid-Fire Crown Jewels Assessments
In a world where the universe of digital assets is growing exponentially and attack vectors into companies are proliferating — how should…
Sabab Ahmed
Dec 18, 2023
Key Changes in PCI DSS 4.0 for Organizations to Address
Key Changes in PCI DSS 4.0 for Organizations to Address
On March 31, 2024, the Payment Card Industry Security Standards Council (PCI SSC) will enact version 4.0 of its Data Security Standard (PCI…
Brian Gastwirth
Dec 18, 2023
The SEC’s Cybersecurity Incident Reporting Rule and What It Means to Your Company
The SEC’s Cybersecurity Incident Reporting Rule and What It Means to Your Company
With the average cyber attack costing companies nearly $4.5M per breach investors require increasingly consistent and transparent…
Phillip Carrington
Dec 12, 2023
The Future of Work with AI: Benefits, Limitations, and Ethical Concerns
The Future of Work with AI: Benefits, Limitations, and Ethical Concerns
Introduction
Josh Tupper
Dec 11, 2023
SOC Automation: Trends and Best Practices
SOC Automation: Trends and Best Practices
Josh Tupper
Oct 30, 2023
The IAM Iceberg
The IAM Iceberg
Navigating IAM’s Depths Amidst the Temptation of Tools
Zachary White
Oct 17, 2023
Identifying and Addressing Top Automation Opportunities in Fortune 500 Companies
Identifying and Addressing Top Automation Opportunities in Fortune 500 Companies
Harnessing automation to perform tasks that traditionally require human intervention is more than a passing trend…
Connor Parkinson
Oct 9, 2023
GitHub — a Dangerous Platform if your house isn’t in order
GitHub — a Dangerous Platform if your house isn’t in order
Every year hacker summer camp (aka Defcon, Blackhat, BSides) arrives in a flurry of anticipation, presentations, and great ideas that…
Michael Morgenstern
Sep 20, 2023
Prioritizing the Virtual Private Cloud for PHI in Healthcare
Prioritizing the Virtual Private Cloud for PHI in Healthcare
Cloud infrastructure systems present an incredible opportunity for healthcare organizations to not only greatly save on costs, but also…
Christa Zubic
Aug 17, 2023
IAM in the Cloud
IAM in the Cloud
Scaling the capabilities of Identity and Access Management (IAM) teams now requires not only meeting requirements for potentially hundreds…
Jacob Armijo
Jul 26, 2023
Top 4 Cloud Risks of 2023 & A Cloud Security Framework to Address Them
Top 4 Cloud Risks of 2023 & A Cloud Security Framework to Address Them
Businesses establishing themselves in the cloud invest in services that optimize processes and increase productivity. Cloud implementation…
Princess Polidore
Jun 26, 2023
The Lost Art of Platform Architecture Design Documentation
The Lost Art of Platform Architecture Design Documentation
Has platform architecture design documentation become a lost art? Over the past decade, we have observed this trend across many IT…
Justin Whitaker
Jun 16, 2023
2023 Cloud Threats and Vulnerabilities Summit Recap
2023 Cloud Threats and Vulnerabilities Summit Recap
The Cloud Security Alliance (CSA) recently held its Cloud Threats and Vulnerabilities Summit, featuring prominent speakers across 20…
Brian Gastwirth
Apr 21, 2023
Securing the Hybrid Working World
Securing the Hybrid Working World
How we can improve cybersecurity practices by targeting specific layers of the organization with unique tactics and strategies
Harry Baker
Apr 6, 2023
A Summary of the Treasury Report: “The Financial Services Sector’s Adoption of Cloud Services”
A Summary of the Treasury Report: “The Financial Services Sector’s Adoption of Cloud Services”
The U.S. Department of Treasury recently released its “The Financial Service’s Sector’s Adoption of Cloud Services” (“Cloud Report”)…
Phillip Carrington
Mar 6, 2023
Four Cybersecurity trends to watch for in 2023
Four Cybersecurity trends to watch for in 2023
As 2023 approaches, it is time to look into our crystal ball for some trends that will define cybersecurity over the next year. With most…
Phillip Carrington
Dec 19, 2022
Messy IT Asset Management: Unorganized Closet or Fire Starter?
Messy IT Asset Management: Unorganized Closet or Fire Starter?
IT Asset Management is often the un-owned, unwanted, and un-optimized major initiative that large technology (and especially non-tech)…
Jacob Armijo
Dec 14, 2022
Responsible Disclosure — Reflections on the Past 20 years
Responsible Disclosure — Reflections on the Past 20 years
It’s hard to believe that over 20 years have passed since Steve Christey and Chris Wysopol published the first substantive call for an…
Michael Morgenstern
Dec 5, 2022
About DayBlink Consulting
Latest Stories
Archive
About Medium
Terms
Privacy
Teams