Discussion about this post

User's avatar
Scott Weyandt's avatar

Love the application of “epistemological humility” to cybersecurity. It would be interesting to tease out how this approach informs the following “Is this the same as assuming all systems are untrustworthy until proven otherwise as zero trust models propose? I don’t think so, but would imagine the two issues (zero trust and insecure systems) are loosely coupled.” Perhaps understanding the gaps in program maturity and architecture is where humility translates into better informed risk management…focused on actual institutional risks…. Great topic!

Expand full comment
1 more comment...

No posts