Deploying Securely
Subscribe
Sign in
Home
Products
Ghostwriting
Archive
About
New
Top
Discussion
Generative artificial intelligence (AI) security policy template
Deploying Securely with ChatGPT
Walter Haydock
Mar 16
2
2
Share this post
Generative artificial intelligence (AI) security policy template
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Can ChatGPT convert unstructured vulnerability reports into CycloneDX VEX statements (and vice versa)?
Diving into AI applications for cybersecurity.
Walter Haydock
Mar 10
2
Share this post
Can ChatGPT convert unstructured vulnerability reports into CycloneDX VEX statements (and vice versa)?
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Supercharge inbound marketing with a proven content strategy
The only thing better than writing content as a CEO is another CEO doing it for you.
Walter Haydock
Mar 6
3
Share this post
Supercharge inbound marketing with a proven content strategy
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Deconstructing the National Cybersecurity Strategy
All the wheat and none of the chaff.
Walter Haydock
Mar 3
4
Share this post
Deconstructing the National Cybersecurity Strategy
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
February 2023
What do exploit, exploitable, and exploit code mean in cybersecurity terms?
Trying to clear up some confusion.
Walter Haydock
Feb 24
1
Share this post
What do exploit, exploitable, and exploit code mean in cybersecurity terms?
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Declaring a truce on SaaS security
Break out of the prisoner's dilemma.
Walter Haydock
Feb 17
3
Share this post
Declaring a truce on SaaS security
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
What is the difference between supply chain, third-party, and vendor risk management?
And how to measure the risk correctly.
Walter Haydock
Feb 10
9
Share this post
What is the difference between supply chain, third-party, and vendor risk management?
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
What software security regulation should (not) look like
A response to CISA's recent Foreign Affairs piece.
Walter Haydock
Feb 3
5
10
Share this post
What software security regulation should (not) look like
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
January 2023
What is the difference between a software vulnerability and a security misconfiguration?
A clear definition.
Walter Haydock
Jan 27
5
Share this post
What is the difference between a software vulnerability and a security misconfiguration?
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
How to ask for career advice in cybersecurity
The right way to go about it.
Walter Haydock
Jan 20
2
Share this post
How to ask for career advice in cybersecurity
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
Writing security requirements
Starting off on the right foot.
Walter Haydock
Jan 13
2
Share this post
Writing security requirements
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
10 business terms security professionals should know
Get an edge in the buzzword battle.
Walter Haydock
Jan 6
1
Share this post
10 business terms security professionals should know
www.blog.deploy-securely.com
Copy link
Twitter
Facebook
Email
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts