Posts by Josh Mayfield

Josh Mayfield
Josh is Absolute’s Director of Security Strategy and works with Absolute customers to leverage technology for stronger cybersecurity, continuous compliance, and reduced risk on the attack surface. He has spent years in cybersecurity with a special focus on network security, threat hunting, identity management, and endpoint security. His research has been featured in leading security publications including, SC Magazine, Infosec, and Dark Reading, and he is often cited by business and tech journalists for his analysis of cryptocurrencies, security operations, and attacker psychology.
NIST Cybersecurity Framework: Fifth, Iterate and Adapt
Josh Mayfield
NIST Cybersecurity Framework: Fifth, Iterate and Adapt

We come at last to the final stop on our journey to implement the NIST Cybersecurity Framework (CSF). In previous posts, we’ve looked at how to identify, protect, detect and respond to security risks. Here, with the final pillar of the NIST CSF, Recover, we get a chance to reflect on what has happened and incorporate that new knowledge to improve our people, process, and technology for greater cyber...

READ MORE
How to Succeed in the Digital Healthcare Frontier
Josh Mayfield
How to Succeed in the Digital Healthcare Frontier

Healthcare is data. To effectively treat patients and create new forms of care, information must be shared, analyzed, and transmitted across several devices, among a number of healthcare professionals, insurance providers and other third parties. The sensitive nature of this personal information has long made healthcare an attractive target to cyber criminals while the complex nature of the industry creates continued struggles to protect the data, as frequent data...

READ MORE
NIST Cybersecurity Framework: Fourth, Adopt a Bias to Action
Josh Mayfield
NIST Cybersecurity Framework: Fourth, Adopt a Bias to Action

In my previous posts, we explored how to identify, protect and implement detection measures established in the NIST Cybersecurity Framework (CSF). Throughout this series, we’ve been noting how any IT and IT security team can implement the NIST CSF with deliberate and tangible steps that improve their security posture. The framework consists of what I call ‘pillars’ and this installment is about the fourth pillar: Respond. Once the first three...

READ MORE
NIST Cybersecurity Framework: Third, Go Looking for Trouble
Josh Mayfield
NIST Cybersecurity Framework: Third, Go Looking for Trouble

Throughout this series, we’ve been exploring how a standard issue IT team can implement the NIST Cybersecurity Framework (CSF). Within the framework, there are five principle areas, what I call ‘pillars’, where IT and IT security teams can focus their attention to improve their cyber resilience. We looked at the first two pillars—identify and protect—in previous posts. Here, we can zero-in on the next step to NIST CSF success:...

READ MORE
NIST Cybersecurity Framework: Second, Build a Moat – Part 2
Josh Mayfield
NIST Cybersecurity Framework: Second, Build a Moat – Part 2

The NIST Cybersecurity Framework is a repeatable framework organizations may follow to bolster their security posture. Within it, there are 5 foundational actions that may be flexibly deployed, regardless of industry or setting. In this, the second of a two-part post, we focus on the second action, Protect whereby NIST outlines 4 practical steps to protect data. My previous post explained access control and user awareness. This post takes...

READ MORE