Skip to main content

Posts

Why Mean Time to Detect (MTTD) Is a Foundational Cybersecurity Metric

Recent posts

Why Mean Time to Contain (MTTC) Matters as a Core Cybersecurity Metric

When discussing cybersecurity performance and resilience, most organizations first think about prevention: firewalls, patching cadence, penetration testing, vulnerability counts, and control coverage. These are necessary defenses, but like all defenses, they will eventually be tested. As discussed in the previous post on Mean Time to Respond (MTTR), how quickly an organization recovers after an incident is a critical indicator of security maturity. But there is a metric that sits squarely between detection and recovery that often gets overlooked, despite having a direct impact on risk and business impact: Mean Time to Contain (MTTC). What Is Mean Time to Contain (MTTC)? Mean Time to Contain (MTTC) measures the average amount of time it takes to stop an active security incident after it has been detected. Containment is not remediation. It is the act of preventing further damage while the incident is still in progress. Typical containment activities include: Isolating affected en...

How to Prepare for an Information Security Interview (and Stand Out)

Getting your first job in information security can be challenging. The field is competitive, and many candidates focus heavily on certifications, technical skills, and resumes. However, interviews are where most hiring decisions are made. Security hiring managers are evaluating more than your technical knowledge. They are assessing your preparation, professionalism, communication skills, and genuine interest in their organization. Proper interview preparation can significantly increase your chances of landing an information security job. This guide walks through how to prepare for an information security interview and stand out from other candidates. Research the Company Before Your Interview One of the most important interview preparation steps is researching the company. This goes far beyond reading the job description. Before your interview, you should understand: The company’s industry, mission, and business model Products or services the organization provides Recent news, ...

Getting Your First Information Security Job: Why Courage and Outreach Matter More Than Another Resume

Breaking into information security is one of the hardest steps in a cybersecurity career. The field is competitive, job postings attract hundreds—sometimes thousands—of applicants, and many qualified candidates never hear back from a recruiter. If you are trying to land your first information security role , here is an uncomfortable truth: Submitting resumes alone is rarely enough. Recruiters are overwhelmed. Automated screening filters are imperfect. Strong candidates often get lost in the noise. To stand out, you need to do something many people are hesitant to do—but that hiring managers notice immediately. You need to reach out directly . Recruiters Are Not the Bottleneck—Volume Is Most recruiters are not ignoring you. They are buried. A single entry-level security posting can generate: • Hundreds of resumes within days • Many candidates with overlapping credentials • Limited time to deeply assess motivation or growth potential This means effort, initiative, and communication s...