top of page
All Posts
Accessible and Pragmatic Threat Modelling with STRIDE-LM
The scenario: You're about to go live with a new platform, but the Security team tells you that they have not signed off and there's...

Jes Nicholson
Feb 214 min read
45 views
0 comments
A practical start to your Threat-Driven Defense journeyÂ
You understand and have experienced the challenge of your organisation being solely compliance driven or perhaps you read our previous...

Mike Weinstock
Feb 44 min read
109 views
0 comments
Threat-Driven vs. Compliance-Driven: Maximising Your Cybersecurity ROI
In the realm of cybersecurity, organisations often face a critical decision: should they prioritise a threat-driven approach or a...

Mike Weinstock
Feb 43 min read
8 views
0 comments
Welcome to 25’ courtesy of Fortinet
I hope you all had a wonderful holiday and are feeling as energised and excited about what 2025 holds for you. As I was working on the...

Mike Weinstock
Jan 173 min read
4 views
0 comments
Introduction to Threat Informed Defence
During the Battle of Britain, the use of radar was decisive. It showed the British where German planes were going, so they could get...

Mike Weinstock
Dec 9, 20242 min read
10 views
0 comments
Practical Cybersecurity, with passion.
Today is day two for Compassa. A cybersecurity company built with passion and with values Jes and I are proud of - more on that in the...

Mike Weinstock
Dec 3, 20243 min read
17 views
0 comments
bottom of page