{"id":6120,"date":"2020-08-20T22:16:07","date_gmt":"2020-08-20T22:16:07","guid":{"rendered":"http:\/\/www.hexacorn.com\/blog\/?p=6120"},"modified":"2020-08-20T22:16:07","modified_gmt":"2020-08-20T22:16:07","slug":"laws-of-infosec","status":"publish","type":"post","link":"https:\/\/www.hexacorn.com\/blog\/2020\/08\/20\/laws-of-infosec\/","title":{"rendered":"Laws of infosec"},"content":{"rendered":"\n<p>In the past I <a href=\"https:\/\/twitter.com\/Hexacorn\/status\/1108726593848049664\">posted<\/a> what I called a law of a threat hunter, but thought we could probably generalize and expand it a bit more, and in the end I came up with this list:<\/p>\n\n\n\n<p><strong>The law of a threat hunter<\/strong><\/p>\n\n\n\n<p><em>For every two most distant technologies there exist a developer that will bring them together.<\/em><\/p>\n\n\n\n<p><strong>The law of an end user<\/strong><\/p>\n\n\n\n<p><em>The end user is not a security control.<\/em><\/p>\n\n\n\n<p><strong>The law of a mind blowing \/ disrupting product \/ service offering<\/strong><\/p>\n\n\n\n<p><em>Congratulation on your Quality Assessment of an unfinished product opportunity.<\/em><\/p>\n\n\n\n<p><strong>The law of a vendor promise<\/strong><\/p>\n\n\n\n<p><em>It works in our lab. We have it on our roadmap. Defo in our next release.<\/em><\/p>\n\n\n\n<p><strong>The law of a infosec certification<\/strong><\/p>\n\n\n\n<p><em>You are certified to have a certification. <\/em><\/p>\n\n\n\n<p><strong>The law of an infosec advice<\/strong><\/p>\n\n\n\n<p><em>It&#8217;s most of the time a subjective, biased opinion.<\/em><\/p>\n\n\n\n<p><em><strong>The law of an Infosec Though Leader<\/strong><\/em><\/p>\n\n\n\n<p><em>&#8220;Actually&#8221;<\/em><\/p>\n\n\n\n<p><em><strong>The law of a novel cyber idea<\/strong><\/em><\/p>\n\n\n\n<p><em>McAfee did it first. <\/em> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the past I posted what I called a law of a threat hunter, but thought we could probably generalize and expand it a bit more, and in the end I came up with this list: The law of a &hellip; <a href=\"https:\/\/www.hexacorn.com\/blog\/2020\/08\/20\/laws-of-infosec\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[18],"tags":[],"_links":{"self":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/6120"}],"collection":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/comments?post=6120"}],"version-history":[{"count":6,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/6120\/revisions"}],"predecessor-version":[{"id":7400,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/6120\/revisions\/7400"}],"wp:attachment":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/media?parent=6120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/categories?post=6120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/tags?post=6120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}