nmap (Network Mapper)

Further reading Top 8 penetration testing tools (Snyk Blog)

1 min

No true Scotsman

Further reading No true Scotsman

1 min

Normalcy bias

Further reading Normalcy bias - Wikipedia

1 min

Openshift Container Platform (OCP) cluster

An OpenShift cluster is a set of connected computers (called nodes) that run applications in containers. It lets you easily deploy, manage, and monitor these applications, and is designed for cloud environments.

1 min

OpenStack

OpenStack is a free and open-source cloud computing platform that lets users build and manage their own private and public clouds. It provides software tools for managing compute, storage, and networking resources in a data centre. A primary use case for OpenStack is when an organisation wants to build a private cloud environment. Related pages OpenStack.org

1 min

OpenVAS

Further reading OpenVAS website Related pages Nessus

1 min

Operational resilience

Operational resilience for an organisation can be defined as the ability to prevent, adapt, withstand, respond to, recover, and learn from operational disruptions to ensure the continuity of critical business services. Further reading The Concept of Resilience: A New Buzzword - CMS Wire What Is True Resilience? - Forbes Response and resilience in operational-risk events - McKinsey Operational resilience: Regulation Around the World - Norton Rose Fulbright Operational resilience for insurers - PwC Operational resilience for insurance firms - Grant Thornton Operational resilience insights for insurance firms - Financial Conduct Authority Operational Resilience - Bank of England & PRA & FCA Cyber operational resilience and cyber insurance - EIOPA Toward True Organisational Resilience - Deloitte Risk Resilience Report - Marsh McLennan BCI launches Continuity & Resilience Report 2022 - BCI The Business of Resilience: summary report 2022 - UK Gov Resilience Reports - European Commission Resilience: Building back better - HSBC International regulatory alignment on operational resilience - Deloitte UK Resilience without borders - Deloitte UK PS21/3 Building operational resilience - Financial Conduct Authority SS1/21: Operational resilience: Impact tolerances for important business services - Bank of England

1 min

Operational Resilience OR-2 | HKMA

The OR-2 module sets out the HKMA’s supervisory expectations for authorised institutions to maintain operational resilience in the event of a disruption. Further reading OR-2 SPM Module | HKMA (PDF) Operational Resilience: A new SPM module from HKMA | Deloitte Operational Resilience | KPMG The HKMA proposes new standards for operational resilience | Herbert Smith Freehills Fostering operational resilience | PwC Hong Kong SFC issues operational resilience standards and recommended techniques and procedures in the age of remote working | Herbert Smith Freehills Operational resilience and remote working | SFC Circular Related pages Operational Resilience (wiki) SPM TM-G-1 General Principles for Technology Risk Management SPM TM-G-2 Business Continuity Planning OR-1 Operational Risk Management SA-2 Outsourcing Cyber Resilience Assessment Framework 2.0

1 min

OR-1 Operational Risk Management | HKMA

0 min

Outputs from a Threat modelling exercise

Threat modelling is a critical component of an organisation’s cybersecurity and risk management framework. The process will identify potential threats, assess vulnerabilities, and implement effective controls. Key outputs of a threat modelling exercise in a large organisation will include: 1. Threat Model Diagram. A visual representation of systems, data flows, and trust boundaries. Common formats include Data Flow Diagrams (DFDs) or Process Flow Diagrams, highlighting how data moves through the system and where risks may emerge. ...

2 min

OWASP

OWASP (Open Web Application Security Project) is a non-profit organisation and online community dedicated to providing open-source solutions to help build secure web applications. Further reading OWASP Top Ten

1 min

Patching

Patching is a process in software development and ongoing maintenance where updates are applied to software to fix problems with the original code such as fixing vulnerabilities, improving functionality, or to enhance performance and speed. These updates, known as patches, are essential for maintaining the security and efficiency of software systems. Further reading Patching - Wikipedia

1 min

Paul Graham - Essays

Paul Graham’s Essays Start with How to do great work

1 min

Penetration Testing

Penetration testing (or pen testing) is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system’s defenses which attackers could take advantage of. This is like a bank hiring someone to dress as a burglar and try to break into their building and gain access to the vault. If the ‘burglar’ succeeds and gets into the bank or the vault, the bank will gain valuable information on how they need to tighten their security measures. ...

1 min

Permacomputing

Further reading Permacomputing wiki - introduction

1 min