The Home of Holistic Cybersecurity

Providing Cybersecurity Guidance For Your Entire Ecosystem

Security as a Service:
Introducing

The world's first AI-based software for implementing Holistic Cybersecurity.

A new wide-ranging article on the journey to the Secure Network Cloud published in ISE Magazine. 
Click to view

Download the updated E-book or get delivery of the Paperback from Amazon.com

Breaking
Cybersecurity
News

Click here for the very latest and most impactful Cybersecurity news this month.

  • Pervasive threats
  • New Healthcare revelations
  • Video Decode revelations
  • 2023 US National Security Strategy and Critical Infrastructure Directives
  • and more …

Cybyr.com Resources

All new for 2023: our unique CybyrScore AI-based evaluation and advice to strengthen you security. Click here for more info.

More than just a glossary of terms, our CyberPedia Page looks beyond the vested interest and bias of what seems a simple topic now covering more than 200 of the latest (May 2023) Cybersecurity terms. Click here to access.

So much confusion and misdirection still about Zero Trust. In today’s world, it’s the only viable strategy. Click here for our holistic approach to this key topic
Intended primarily as an online extension to references in the book, this page contains active links from the book’s reference section. Click here to access.
List and description of Industry Associations engaged in Cybersecurity activities. Click here to access.
Overview and preview of sections coming shortly Click here to access.

Instant Playbook

Get started right now. Click here for  the Top Ten List of Cybersecurity Actions:

Recent Features and Videos

A new wide-ranging article on the journey to the Secure Network Cloud published in ISE Magazine.It covers Secure Access Service Edge and Secure Service Edge, Standards and Open-Source Challenges, Newly Available Standards, Layered Business Architecture and Service and Cloud Provider, Integrator and End-user perspectives. Click to view

A new 2023 article on holistic Cybersecurity and Zero Trust published in ISE Magazine. Click to view

ONUG’s Network Cloud Working Group explores the meaning of agile, elastic Infrastructure in today’s multi-cloud world.
For those of you I met and have a copy of my book this week, I hope you enjoy it and find it useful. The Sessions on Zero Trust and Network Cloud will post shortly, I believe.

Discover how Holistic Cybersecurity both uses and complements the Exponential Organization (ExO) methodology in use by more than 17,000 consultants worldwide. Click here to read the article.

On overview of Zero Trust

ONUG’s Network Cloud Working Group explores the meaning of agile, elastic Infrastructure in today’s multi-cloud world.

An Introduction to Holistic Cybersecurity

Most Cybersecurity services and products focus on Information Technology, selling branded solutions, missing critical actions, impacting the entire organization, leaving weak links to be exploited.

This new Holistic Approach To Cybersecurity covers all aspects of your organization, large & small, starting with the Exec team  plus your suppliers and contractors.

Transformative not just informative, it gives guidance on 100 actions in the mind-bending world of Cybersecurity that moves faster than you can read about it. It looks at long-term causes, the latest scary threats covers the latest IT innovations and Zero Trust strategies to address these threats and reduce risk.

 

If it enables you to mitigate the most vulnerable threats to your organization’s existence, then this work will have succeeded.

I wrote this for those executives who have neither the time nor inclination to read it! If it’s not understood or adopted by the organization’s leadership, it will likely fail.
For CSO/CISOs it’s a checklist of what’s needed to implement Holistic Cybersecurity. If you are not part of the executive team or don’t have a dedicated security or IT resource, it will bring awareness of its holistic nature and delegation to providers.

The title of the book: “Hey, Who Left the Back Door Open?” The strength of the front door doesn’t matter if the back door is left open. Oh, and in today’s Cloud-oriented world, there are no walls, let alone a back door to defend – and anyway, the enemy is likely already inside!