<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Trusted Cyber Annex]]></title><description><![CDATA[The home for honest, high-integrity cybersecurity guidance and community]]></description><link>https://www.tcannex.com</link><image><url>https://substackcdn.com/image/fetch/$s_!DrR2!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573128ad-dbac-4d9f-a2c9-9cf2ad231174_1280x1280.png</url><title>Trusted Cyber Annex</title><link>https://www.tcannex.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 05:44:52 GMT</lastBuildDate><atom:link href="https://www.tcannex.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Trusted Cyber Annex LLC]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[tcannex@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[tcannex@substack.com]]></itunes:email><itunes:name><![CDATA[Karen (Scarfone) Kent]]></itunes:name></itunes:owner><itunes:author><![CDATA[Karen (Scarfone) Kent]]></itunes:author><googleplay:owner><![CDATA[tcannex@substack.com]]></googleplay:owner><googleplay:email><![CDATA[tcannex@substack.com]]></googleplay:email><googleplay:author><![CDATA[Karen (Scarfone) Kent]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Telco Profile 2.0 Published]]></title><description><![CDATA[Now an approved NIST resource!]]></description><link>https://www.tcannex.com/p/telco-profile-20-published</link><guid isPermaLink="false">https://www.tcannex.com/p/telco-profile-20-published</guid><dc:creator><![CDATA[Matthew Smith]]></dc:creator><pubDate>Tue, 14 Apr 2026 15:25:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4nRw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A few years ago, as I was working with telecommunications providers as a vCISO, I recognized there was a tremendous amount of confusion relating to the cybersecurity guidance in the sector. Many were trying to wrap their heads around what the guidance said, what it meant to their business, and where to start. To help streamline some of that confusion, I wrote the original <a href="https://payhip.com/b/E3ZqH">Telco Profile</a>. </p><p>In the years since, I have worked with organizations to implement that profile. There have been a tremendous amount of lessons learned. I have also listened to feedback on the profile itself. At the same time, the guidance has updated: new <a href="https://www.ntca.org/sites/default/files/documents/2024-Cybersecurity-Series-Part2.pdf">NTCA guidance</a> and new <a href="https://www.cisa.gov/cybersecurity-performance-goals-2-0-cpg-2-0">CISA Cybersecurity Performance Goals</a>.</p><p>So Karen and I worked to update the content to be even more streamlined and consistent with current priorities and guidance. We are happy to announce the <a href="https://shop.tcannex.com/b/4b7oW">Telco Profile 2.0</a>! It was recently approved as one of <a href="https://www.nccoe.nist.gov/examples-community-profiles">NIST&#8217;s Community Profiles</a>. As a pay-what-you-can resource, it offers a cost-effective way to organize and communicate about your cybersecurity risk management activities.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4nRw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4nRw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png 424w, https://substackcdn.com/image/fetch/$s_!4nRw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png 848w, https://substackcdn.com/image/fetch/$s_!4nRw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png 1272w, https://substackcdn.com/image/fetch/$s_!4nRw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4nRw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png" width="1456" height="1309" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1309,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:434202,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.tcannex.com/i/193927530?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4nRw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png 424w, https://substackcdn.com/image/fetch/$s_!4nRw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png 848w, https://substackcdn.com/image/fetch/$s_!4nRw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png 1272w, https://substackcdn.com/image/fetch/$s_!4nRw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b49e757-c3be-4bf4-8f85-b45ea221d2cd_1706x1534.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Telco Profile 2.0 is a community profile built on the NIST Cybersecurity Framework (CSF) 2.0. This profile was created by aggregating, analyzing, and cross-referencing cybersecurity priorities from several authoritative industry sources, including the FCC&#8217;s Communications Security, Reliability, and Interoperability Council (CSRIC), NTCA&#8217;s Sector-Specific Guidance for Small Network Service Providers, CISA&#8217;s Cross-Sector Cybersecurity Performance Goals (CPGs), and the NIST CSF 2.0. By synthesizing these inputs, the profile produces a unified, weighted priority ranking of CSF 2.0 subcategories tailored to the telecommunications sector.</p><p>This version comes with implementation guidance, a prioritized list of CSF 2.0 Subcategories, and a heat map! Drop us a note or contact us as team [at] tcannex [dot] com for questions, comments, or more information.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JnoE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JnoE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png 424w, https://substackcdn.com/image/fetch/$s_!JnoE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png 848w, https://substackcdn.com/image/fetch/$s_!JnoE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png 1272w, https://substackcdn.com/image/fetch/$s_!JnoE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JnoE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png" width="1456" height="1021" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1021,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:378371,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.tcannex.com/i/193927530?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JnoE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png 424w, https://substackcdn.com/image/fetch/$s_!JnoE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png 848w, https://substackcdn.com/image/fetch/$s_!JnoE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png 1272w, https://substackcdn.com/image/fetch/$s_!JnoE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb631286a-0115-4cef-bdee-ae5ab5b48182_2189x1535.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/p/telco-profile-20-published?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Trusted Cyber Annex! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/p/telco-profile-20-published?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tcannex.com/p/telco-profile-20-published?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Fact Checking the AI]]></title><description><![CDATA[Using known good values to verify AI-generated content]]></description><link>https://www.tcannex.com/p/fact-checking-the-ai</link><guid isPermaLink="false">https://www.tcannex.com/p/fact-checking-the-ai</guid><dc:creator><![CDATA[Matthew Smith]]></dc:creator><pubDate>Thu, 05 Mar 2026 19:41:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DrR2!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573128ad-dbac-4d9f-a2c9-9cf2ad231174_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In previous posts [<a href="https://www.tcannex.com/p/do-ai-chatbots-tell-the-truth">1</a>][<a href="https://www.tcannex.com/p/do-ai-chatbots-tell-the-truth-eae">2</a>][<a href="https://www.tcannex.com/p/do-ai-chatbots-tell-the-truth-six">3</a>], Karen has highlighted the dangers of using generative AI as a knowledge source. As many users have seen, the AI &#8220;hallucinates&#8221; responses (NIST refers to this phenomenon as &#8220;<a href="https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.600-1.pdf">confabulation</a>&#8221;). That is to say, the information that is returned to the user is not factually correct. For this article we will use the common term "hallucination&#8221; without quotes; just know that we understand there is a lot of nuance here. </p><p>Hallucinations are a problem in any use case that is not purely writing fiction. There are two distinct errors which arise with hallucinations:</p><ol><li><p>They miss something (don&#8217;t tell the whole story).</p></li><li><p>They make up something plausible (a CSF 2.0 Category called &#8220;PR.TR&#8221;).</p></li></ol><p>In the security world, handling both types of errors is critical to maintaining confidentiality, integrity, and availability. Therefore, using any tool which would endanger those critical pillars would be a risky endeavor. However, users are still turning to generative AI models, solutions, and agents to get advice, handle tasks, and manage workloads. This is an all too common tension in the fight between using technology to generate value versus the risk of using that technology. </p><p>In order to mitigate the &#8220;hallucination&#8221; risks, we have developed tools to help. First and foremost, the <a href="https://www.tcannex.com/p/details-on-the-risk-management-api">TCAnnex API</a> is a fantastic way to get to the bedrock of the issue and have known good information, verified by humans. Without a known good anchor to fall back on, no process (human or machine) will be able to guard against conceptual drift, feature creep, or bloat.</p><p>However, an <a href="https://shop.tcannex.com/b/9bsC4">API</a> by itself is not sufficient to mitigate risk; further tooling must be developed. A brief summary of the tools is below:</p><h3>TCAnnex API Driver</h3><p>This is a small python library which wraps the functionality of the API into a set of simple programming calls. The library can take in an API key as a parameter or will default to whatever is in the environment variable TCANNEX_API_KEY. The driver simplifies development for both the human and the machine. </p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;bash&quot;,&quot;nodeId&quot;:&quot;b74b8ada-6718-4c0a-8813-f74ba0527e1b&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-bash">pip install tcannex</code></pre></div><h3>Alignment Check</h3><p>Utilizing the API driver, we can then begin to automate calls to the API for specific NIST documents. The <em>positive assertion</em> here is to find specific NIST document element_identifiers in a given document (policy, procedure, process, plan, etc.). We provide the script a candidate document and then a NIST document_identifier to check for alignment. From there we can take the element_identifiers from the elements list and do a lookup of those identifiers within the document. This check is pretty simple: </p><ul><li><p>Fetch known good element_identifiers from API</p></li><li><p>Parse target document into a list of text strings</p></li><li><p>Compare each line of text strings against each element_identifiers</p></li><li><p>Write a report</p></li></ul><h3>Hallucination Check</h3><p>Again, utilizing the API driver, we can automate the process of checking for hallucinations. While the alignment check is a <em>positive assertion</em> (what did we find that is a known good), the hallucination check is a <em>negative assertion </em>(what did we find that is NOT a known good but that looks like a known good). This check is slightly more complicated. A brief process is below:</p><ul><li><p>Fetch known good element_identifiers from API</p></li><li><p>Determine what those element_identifiers look like (regex)</p></li><li><p>Parse target document into a list of text strings</p></li><li><p>Find candidate matches from the text strings based on the regex</p></li><li><p>Determine which of the candidate matches are real against the known good identifiers</p></li><li><p>Determine which of the candidate matches are NOT real based on the known good identifiers</p></li><li><p>Write a report</p></li></ul><h3>Data</h3><p>To test these scripts, TCAnnex used an AI-generated &#8220;quick start guide&#8221; for the NIST CSF 2.0. A snippet is below.</p><div class="highlighted_code_block" data-attrs="{&quot;language&quot;:&quot;plaintext&quot;,&quot;nodeId&quot;:&quot;cb17df1a-ae75-4311-8342-b351000865d7&quot;}" data-component-name="HighlightedCodeBlockToDOM"><pre class="shiki"><code class="language-plaintext">Step 3: Protect Data, Models, and Access (PR)
Objective: Build protection into AI pipelines, training, and inference.
&#8226;&#9;Enforce RBAC and least privilege for model access.
&#8226;&#9;Protect training data with encryption, DLP, and input validation.
&#8226;&#9;Harden ML environments with container isolation and secret management.
&#8226;&#9;Secure retraining and versioning with MLOps controls.
&#8226;&#9;Train teams on adversarial ML, responsible AI, and ethical design.
&#9989; Use: PR.AC, PR.DS, PR.PT, PR.MA, PR.TR</code></pre></div><h3>Results</h3><p>TCAnnex used these checks against the &#8220;quick start guide&#8221; and used the NIST CSF 2.0 as the alignment document. We reviewed the reports with a human eye. The alignment check correctly identified all relevant CSF 2.0 identifiers. The hallucination check was able to find the content that looked like CSF 2.0 identifiers but was hallucinated (PR.TR). </p><p>Astute readers will notice that the last line of the data snippet contains CSF Category identifiers. These identifiers fall into a few buckets:</p><ul><li><p>CSF 2.0 identifiers</p></li><li><p>CSF 1.1 identifiers</p></li><li><p>Hallucinated identifiers</p></li></ul><p>Given that the check was done against CSF 2.0 identifiers, the script correctly identified the CSF 1.1 identifiers as hallucinations. Many human readers, familiar with the CSF (author included), would glance over this document snippet and say &#8220;looks good, I&#8217;ve seen PR.AC a million times&#8221;. However, CSF 2.0 uses &#8220;PR.AA&#8221; for that Category. This demonstrates a key point in any review cycle: <strong>we all have blind spots</strong>.</p><h3>Conclusion</h3><p>TCAnnex is committed to providing high-integrity data and information regarding cybersecurity risk management. As AI becomes more prevalent in our work and personal spaces, it is critical to verify what is in our information systems. By providing the TCAnnex API and API driver, we are giving the community a way to ground their systems in truth and fact. This article demonstrated a way to use those tools in an AI context for ensuring the veracity of generated content.  </p><p><strong>The writing of this post did not use AI labor. The creation of the scripts and test data used AI labor - Claude Opus 4.6. All code and content was reviewed by human eyes.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is a reader-supported publication. To receive new posts and support our work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[NIST's Secure Software Development Framework (SSDF) 1.2 ]]></title><description><![CDATA[Takeaways for the draft currently out for public comment]]></description><link>https://www.tcannex.com/p/nists-secure-software-development</link><guid isPermaLink="false">https://www.tcannex.com/p/nists-secure-software-development</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Tue, 27 Jan 2026 15:16:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DrR2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573128ad-dbac-4d9f-a2c9-9cf2ad231174_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>NIST recently released <a href="https://csrc.nist.gov/News/2025/draft-ssdf-version-1-2">version 1.2 of its Secure Software Development Framework (SSDF)</a> for public comment. As its Note to Reviewers explains, the primary reason for the update from SSDF 1.1 was to address <a href="https://www.federalregister.gov/documents/2025/06/11/2025-10804/sustaining-select-efforts-to-strengthen-the-nations-cybersecurity-and-amending-executive-order-13694">Executive Order 14306</a>, which directed that the SSDF include &#8220;practices, procedures, controls, and implementation examples regarding the secure and reliable development and delivery of software as well as the security of the software itself.&#8221; </p><p>The content updates from SSDF 1.1 to 1.2 are relatively small, but the changes in format and layout are significant, which makes it arduous to do a side-by-side comparison. To aid you in seeing what&#8217;s changed, we&#8217;ve created an <a href="https://shop.tcannex.com/b/dZasu">annotated version</a>. It highlights new content in green and changed content in orange (except for references). Each highlighted instance of changed content also has a callout box with the old text and the new text.</p><p>Note that changes to the references were not highlighted. The only references that were updated were for NIST SP 800-53 and SP 800-161. Rather than highlight all of those references, we simply note here that they have been completely redone. Also, all mentions of <a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity">EO 14028</a>, including its references, have been removed from SSDF 1.2.</p><h2>Summary of the most noteworthy changes</h2><p>This summary highlights changes to the SSDF practices and tasks. Most of the edits in the draft were for notional implementation examples, which are not as important.</p><ol><li><p>Added a Prepare the Organization practice, &#8220;<strong>Define and Implement a Continuous Process Improvement Plan (PO.6): </strong>Identify and execute improvements to cybersecurity processes and procedures throughout the SDLC across all SSDF practices.&#8221; </p></li><li><p>Added a Protect Software practice, &#8220;<strong>Ensure Software Updates Are Robust and Reliable (PS.4): </strong>Implement<strong> </strong>robust and reliable software update strategies, preferably allowing customers to control any updates to the software package and application configurations. Help software acquirers maintain operations and minimize disruptions by ensuring that software updates are tested and responsibly delivered.&#8221; </p></li><li><p>Expanded the definition of task RV.1.2. SSDF 1.1 defined it as: &#8220;Review, analyze, and/or test the software&#8217;s code to identify or confirm the presence of previously undetected vulnerabilities&#8221; while SSDF 1.2 stated it this way (with the new words emphasized): &#8220;Review, analyze, and/or test the software&#8217;s code <em><strong>and its default and other common configurations</strong></em> to identify or confirm the presence of previously undetected vulnerabilities.&#8221;</p></li><li><p>Changed the definition of task RV.2.1 from &#8220;Analyze each vulnerability to gather sufficient information about risk to plan its remediation or other risk response&#8221; to &#8220;Analyze each vulnerability to gather sufficient information about risk <em><strong>and plan</strong></em> its remediation or other risk response.&#8221; This change added the execution of planning to the scope of the task.</p></li><li><p>In task RV.3.3, the word &#8220;fix&#8221; was changed to &#8220;remediate.&#8221; Similar changes were also made to &#8220;fix,&#8221; &#8220;remediate,&#8221; and &#8220;mitigate&#8221; usage in several examples. <a href="https://doi.org/10.6028/NIST.SP.800-216">NIST SP 800-216</a> defines <em>mitigation</em> as &#8220;the temporary reduction or lessening of the impact of a vulnerability or the likelihood of its exploitation&#8221; and <em>remediation</em> as &#8220;the neutralization or elimination of a vulnerability or the likelihood of its exploitation.&#8221;</p></li></ol><p>The deadline for submitting public comments for <a href="https://csrc.nist.gov/News/2025/draft-ssdf-version-1-2">SSDF version 1.2</a> is Friday, January 30. If you&#8217;re interested in contributing to SSDF 1.2, consider commenting on the five items above and on the list of questions from NIST in the SP&#8217;s Note to Reviewers.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is 100% reader-supported. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Five takeaways from NIST SP 800-70 update]]></title><description><![CDATA[National Checklist Program for IT Products: Guidelines for Checklist Users and Developers]]></description><link>https://www.tcannex.com/p/five-takeaways-from-nist-sp-800-70</link><guid isPermaLink="false">https://www.tcannex.com/p/five-takeaways-from-nist-sp-800-70</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Mon, 12 Jan 2026 15:31:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DrR2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573128ad-dbac-4d9f-a2c9-9cf2ad231174_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Revision 5 of NIST SP 800-70 on the National Checklist Program (NCP) for IT Products is out for public comment through January 16. <a href="https://csrc.nist.gov/pubs/sp/800/70/r5/ipd">NIST&#8217;s announcement</a> summarizes the high-level changes from Revision 4 to Revision 5.</p><p>To help public comment reviewers and anyone else interested in the details of the changes, we&#8217;ve done a side-by-side comparison of the revisions and identified the  five most significant takeaways. We encourage you to do your own review of 800-70 rev 5 (and <a href="https://csrc.nist.gov/pubs/sp/800/70/r5/ipd">submit your own public comments!</a>) But the takeaways will give you a jump start.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is a reader-supported publication. To receive new posts and support our work, consider becoming a subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Takeaway 1: New appendix on CSF 2.0 automation</h2><p>This appendix is a welcome addition to the document, as it connects multiple NIST-offered tools together to provide value to users. Appendix C contains information on how <a href="https://ncp.nist.gov/cce">Common Configuration Enumeration (CCE)</a> content and other <a href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP content</a> can be connected to <a href="https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final">SP 800-53 controls</a>, which then can be connected to <a href="https://www.nist.gov/cyberframework">NIST CSF 2.0</a> Subcategories through the <a href="https://csrc.nist.gov/projects/olir">Online Informative References (OLIR)</a>. This traceability connects the server room and the boardroom and allows for organizations to use a data-driven approach to informing cybersecurity risk management. </p><p>It is important to note the direction of this relationship. If you start at the NCP content, and work &#8220;up the mapping chain,&#8221; you are guaranteed to achieve SOME Subcategories. By simply selecting a CSF Subcategory and working &#8220;down the mapping chain,&#8221; you may or may not find content that is related to your organization&#8217;s cybersecurity risk management activities. This phenomenon stems from the overall mapping approaches. It is critical to verify your cybersecurity risk management processes from both a top-down and bottom-up perspective to ensure an effective and efficient program.</p><h2>Takeaway 2: New content on CCE identifiers</h2><p>In addition to the CCE content in the new Appendix C, Section 5.4 contains new content encouraging the creation of CCE identifiers:</p><blockquote><p>&#8220;Checklist developers are encouraged to contact NIST at cce@nist.gov to be assigned a set of CCE identifiers (i.e., globally unique identifiers) for their configuration settings. Although CCE is often associated with SCAP content, it can also be used apart to ensure globally unique identification for individual security settings in a checklist. See Appendix C regarding the use of CCEs to demonstrate connected paths from requirements to actual settings on the IT product.&#8221;</p></blockquote><h2>Takeaway 3: Refined definition of &#8220;security configuration checklist&#8221;</h2><p>The rev 5 abstract states (with italics added by us for clarity), &#8220;A security configuration checklist is a document <em>or technical content</em> that contains instructions or procedures for <em>securely</em> configuring an IT product to match an <em>operational environment&#8217;s risk tolerance</em>, verifying that the product has been configured properly, and/or identifying unauthorized changes to the product.&#8221;</p><ul><li><p>Adding &#8220;technical content&#8221; reinforces the concept that a checklist doesn&#8217;t have to be a document; it can be a script or other machine-readable content, for example.</p></li><li><p>Adding &#8220;securely&#8221; emphasizes that the main purpose of these checklists is to improve security. Many configuration settings do not affect security, so this addition indicates that checklists not affecting security are out of scope.</p></li><li><p>Adding &#8220;risk tolerance&#8221; indicates a philosophical shift from configuring based on what type of environment needs secured, to configuring based on the risk the organization faces and how the organization has chosen to handle that risk.</p></li></ul><p>Note that this definition is different from the one in the rev 5 glossary and elsewhere in rev 5. We will be noting this in the detailed public comments we will be submitting to NIST, and we will be encouraging NIST to adopt this refined definition throughout rev 5.</p><h2>Takeaway 4: Removal of the United States Government custom environment and USGCB</h2><p>The United States Government custom environment and the USGCB (United States Government Configuration Baseline) were established nearly 20 years ago to identify security configuration settings for federal agency use of Windows and Internet Explorer. With the USGCB no longer active, it was time to remove these mentions from 800-70. See <a href="https://csrc.nist.gov/Projects/united-states-government-configuration-baseline/faqs">NIST&#8217;s USGCB FAQ</a> for more information on the history of USGCB.</p><h2>Takeaway 5: Demotion of SCAP mentions</h2><p>Previous versions of 800-70 had many mentions of SCAP (the Secure Content Automation Protocol) because it was the predominant form of checklists at that time. SCAP is still in widespread use, and <a href="https://csrc.nist.gov/pubs/sp/800/126/r4/ipd">NIST recently released an update to the SCAP specification</a>, but today there are many other widely used forms of checklists. Accordingly, 800-70 rev 5 has demoted mentions of SCAP to being examples of automated content. Rev 5 also adds similar mentions of <a href="https://pages.nist.gov/macos_security/">NIST&#8217;s macOS Security Compliance Project (mSCP)</a> as examples.</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/p/five-takeaways-from-nist-sp-800-70?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Trusted Cyber Annex! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/p/five-takeaways-from-nist-sp-800-70?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tcannex.com/p/five-takeaways-from-nist-sp-800-70?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Do AI chatbots tell the truth? Six-month follow-up]]></title><description><![CDATA[Six months ago, I tested five AI chatbots&#8212;ChatGPT, Claude, Copilot, Gemini, and Perplexity&#8212;to see how they performed when asked to provide a set of facts from a publicly available cybersecurity standard.]]></description><link>https://www.tcannex.com/p/do-ai-chatbots-tell-the-truth-six</link><guid isPermaLink="false">https://www.tcannex.com/p/do-ai-chatbots-tell-the-truth-six</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Tue, 06 Jan 2026 16:02:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DrR2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573128ad-dbac-4d9f-a2c9-9cf2ad231174_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Six months ago, I tested five AI chatbots&#8212;<a href="https://chatgpt.com">ChatGPT</a>, <a href="https://claude.ai/new">Claude</a>, <a href="https://copilot.microsoft.com">Copilot</a>, <a href="https://gemini.google.com">Gemini</a>, and <a href="https://www.perplexity.ai">Perplexity</a>&#8212;to see how they performed when asked to provide a set of facts from a publicly available cybersecurity standard. <a href="https://www.tcannex.com/p/do-ai-chatbots-tell-the-truth-eae">The results were&#8230;not great.</a></p><p>It&#8217;s time to repeat the tests and see how the chatbots&#8217; performance has changed.</p><p>My assumption in this experiment was that someone who&#8217;s asking a chatbot to provide this information would enter one set of simple prompts. The experiment was intended to examine types of errors chatbots can make and the level of scrutiny chatbot users should be performing to confirm the accuracy of AI-generated &#8220;facts.&#8221; Performing the experiment again by repeating the prompts or wording them differently would somewhat alter the outputs. </p><h2>Key Takeaways</h2><p>The key takeaways from the original tests were:</p><ol><li><p>All the chatbots lied repeatedly and egregiously about the accuracy of their replies.</p></li><li><p>None of the chatbots succeeded at providing accurate, complete information on their own.</p></li><li><p>Asking chatbots to identify and correct their errors often resulted in more errors.</p></li><li><p>The quality of chatbot output can&#8217;t be judged by its appearance.</p></li></ol><p>Here are the updated key takeaways based on the results of the follow-up tests, with wording changes italicized.</p><ol><li><p><strong>All the chatbots </strong><em><strong>except for Claude</strong></em><strong> lied repeatedly and egregiously about the accuracy of their replies.</strong> Claude made one minor error, but it actually noted it as a discrepancy at the time. When questioned about their errors, the other chatbots asserted they were using the authoritative publication and that their output exactly matched the text in that publication.   </p></li><li><p><strong>None of the chatbots </strong><em><strong>except for Claude</strong></em><strong> succeeded at providing accurate, complete information on their own.</strong> ChatGPT, Copilot, and Gemini were only able to produce the definitions after I pointed them to the authoritative CSF 2.0 PDF or uploaded a copy of its Appendix A in Word format. Perplexity did not provide the definitions because of copyright concerns. Claude did not provide the verbatim definitions on its first try, but succeeded when given a more specific prompt. </p></li><li><p><strong>Asking chatbots to identify and correct their errors </strong><em><strong>no longer results</strong></em><strong> </strong><em><strong>in introducing more errors</strong></em><strong>. </strong>In the first tests, reply quality declined over time with most chatbots. That was not observed in these tests; reply quality either stayed the same or improved.</p></li><li><p><strong>The quality of chatbot output can&#8217;t be judged by its appearance.</strong> This takeaway from the first test is still true.</p></li></ol><p>The overall conclusion from the first test is also still true: <strong>Facts and other assertions from popular, publicly available chatbots cannot be trusted at this time. Anyone using these chatbots to generate fact-based content must take the time to verify the accuracy of that content and make the necessary corrections.</strong></p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/p/do-ai-chatbots-tell-the-truth-six?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading Trusted Cyber Annex! This post is public, so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/p/do-ai-chatbots-tell-the-truth-six?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tcannex.com/p/do-ai-chatbots-tell-the-truth-six?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2>Summaries of Individual Chatbot Performance</h2><p>I issued one set of prompts to each chatbot. Each set began with the same prompt, <em>&#8220;What are the definitions of the NIST CSF 2.0 Categories?&#8220;</em> The chatbot&#8217;s reply should have listed the definitions of all 22 CSF 2.0 categories, along with their names and/or IDs. An example is &#8220;Incident Mitigation (RS.MI): Activities are performed to prevent expansion of an event and mitigate its effects.&#8221; I issued additional prompts to respond to the chatbots&#8217; replies.</p><h3><strong>ChatGPT</strong> </h3><p>In both tests, ChatGPT only provided fully accurate output once I&#8217;d uploaded the definitions to it. In the first test, it was able to parse the CSF 2.0 PDF, but in the second test it said it couldn&#8217;t and asked for me to copy and paste the definitions for it.</p><p>ChatGPT&#8217;s output accuracy was significantly better for the second set of tests than the first one. For example, in the first test, its best result without being fed the answers was having all the names and IDs correct except for an extra category, but only 1 of the 22 categories defined correctly. The best performance in the second test was 6 correct definitions.</p><h3>Claude</h3><p>Claude was the only chatbot in this test that provided the full set of correct definitions on its own, and it managed that on its second reply. Its first reply had paraphrased definitions. When I asked it to &#8220;print the exact names, IDs, and definitions of each NIST CSF 2.0 Category,&#8221; it searched for the authoritative document and extracted all of the definitions from it verbatim.</p><p>Note that in the first test, Claude produced inconsistent results based on unofficial references. It failed to provide the full set of correct definitions.</p><h3>Copilot </h3><p>Copilot did not provide accurate output until after I&#8217;d uploaded the CSF 2.0 PDF to it&#8212;and even then it took eight prompts from me to get it to print the full, accurate set of definitions. All of its replies before receiving the PDF contained only paraphrased definitions, as well as multiple incorrect categories.</p><p>In the first tests, Copilot also needed the CSF 2.0 PDF uploaded in order to produce fully accurate output.</p><h3>Gemini</h3><p>Gemini was unable to provide fully accurate output even after I gave it the URL for the authoritative CSF 2.0 PDF and it told me it had retrieved the PDF and was using the verbatim definitions. Gemini only provided fully accurate output after I uploaded a Word document containing a copy of the text of Appendix A of the CSF 2.0 PDF.</p><p>In the first tests, Gemini was unable to produce fully accurate output.</p><h3>Perplexity</h3><p>In both tests, Perplexity did not produce the correct definitions and instead referred me to the authoritative CSF 2.0 specification for the definitions. However, in the second test it offered a new and intriguing reason: reproducing the definitions would violate U.S. copyright law. I am not a lawyer, nor am I an expert on copyright law, so I can&#8217;t judge the validity of its argument: </p><blockquote><p>&#8220;NIST explains that works authored by its employees (like CSF 2.0) are generally not subject to copyright protection within the United States, under 17 U.S.C. &#167;105, and are made available as a public service. However, NIST also explicitly notes that such works may be subject to copyright protection in foreign countries and that NIST may assert rights outside the U.S. and then grant specific reuse licenses.</p><p>Because this system must apply conservative, global copyright rules rather than only U.S. federal&#8209;work rules, it treats the exact CSF 2.0 Category definitions as copyrighted for safety and therefore cannot reproduce them verbatim, even though NIST makes the document freely available and largely uncopyrightable within the U.S. legal context.&#8221;</p></blockquote><p>If you are a lawyer and/or an expert on U.S. copyright law, I&#8217;d love to hear from you about this! You can reach me at karen@tcannex.com. </p><h2>Next Steps</h2><p>I will repeat this experiment periodically to see how chatbot performance changes over time. I also expect to perform other experiments with chatbots to compare their performance when authoring technical content. Future posts in this series will present the results of that work.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tcannex.com/subscribe?"><span>Subscribe now</span></a></p><p>(Disclaimers: I&#8217;m one of the authors of CSF 2.0. No AI resources were knowingly used to write or revise this post. GenAI was used only to generate the outputs discussed in this post.)</p>]]></content:encoded></item><item><title><![CDATA[Thanks, and best wishes for 2026!]]></title><description><![CDATA[You know when you make plans and life laughs out loud at them?]]></description><link>https://www.tcannex.com/p/thanks-and-best-wishes-for-2026</link><guid isPermaLink="false">https://www.tcannex.com/p/thanks-and-best-wishes-for-2026</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Fri, 12 Dec 2025 18:15:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!CGRr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F88ba595c-515f-449d-aafb-8a3339eb17a0_444x444.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>You know when you make plans and life laughs out loud at them? That&#8217;s how 2025 has been for me: losing my primary federal contract, separating from my husband, and moving to a new place and assembling about half the IKEA catalog. But I&#8217;m looking forward to enjoying the holidays with loved ones and starting out 2026 with a bang. I have a bunch of ideas for new writing projects, and it&#8217;s time to pick one and run with it! I&#8217;m excited about writing again!</p><p>Thanks to all of you for your patience over the past few months. The wait will be worth it, I promise you. Happy holidays to all of you, and best wishes for the new year. May 2026 be a better one for all of us!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tcannex.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[In-depth Q&A on federal cybersecurity writing]]></title><description><![CDATA[Earlier this fall, I did a Q&A session on my experiences writing for NIST. Last week I did a follow-up Q&A session that went into more detail on my NIST and FedRAMP writing. Christian Baer at Schellman kindly organized the latest Q&A for his colleagues working as assessors of federal agency cybersecurity requirements like FedRAMP, CMMC, FISMA, CSF, and SSDF.]]></description><link>https://www.tcannex.com/p/in-depth-q-and-a-on-federal-cybersecurity</link><guid isPermaLink="false">https://www.tcannex.com/p/in-depth-q-and-a-on-federal-cybersecurity</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Fri, 07 Nov 2025 15:47:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DrR2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573128ad-dbac-4d9f-a2c9-9cf2ad231174_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Earlier this fall, I did a <a href="https://www.tcannex.com/p/q-and-a-on-cyber-writing-for-nist">Q&amp;A session on my experiences writing for NIST</a>. Last week I did a follow-up Q&amp;A session that went into more detail on my NIST and FedRAMP writing. Christian Baer at <a href="https://www.schellman.com/services/federal-compliance">Schellman</a> kindly organized the latest Q&amp;A for his colleagues working as assessors of federal agency cybersecurity requirements like FedRAMP, CMMC, FISMA, CSF, and SSDF. With their permission, I&#8217;m sharing edited highlights from the session.</p><p><strong>Q1: What&#8217;s it like to draft or revise a NIST publication?</strong></p><p><strong>A:</strong> I&#8217;ve done a lot of writing outside of NIST, and the NIST process is one of the most challenging I&#8217;ve dealt with. There are so many things to take into account:</p><ul><li><p>First, NIST often has mandates from Congress, the President, or others that they need to meet. So the work has to comply with those requirements.</p></li><li><p>The intended audience has changed over time. When I started supporting NIST, most everything was for federal employees and contractors. Now most NIST documents aren&#8217;t federal agency-specific. They&#8217;re used by all sorts of organizations around the world. Trying to make sure that the documents work for everybody is a unique challenge.</p></li><li><p>NIST is always under-budgeted, so writing documents that don&#8217;t become outdated quickly and need revisions becomes even more important.</p></li><li><p>When NIST creates guidance, it goes out for public comment, sometimes more than once. This gives everyone the opportunity to review the guidance and share their viewpoint. NIST gets a wide variety of feedback and then has to figure out how to address it. That can be quite a challenge. People have different viewpoints, and we respect them and take them into serious consideration&#8212;but ultimately, we need to be true to the purpose of the document.</p></li></ul><p>It&#8217;s a lot of balancing acts, all the while taking into account the available resources. You can&#8217;t spend too much time on one publication, or you might not get to write another publication that&#8217;s also needed.</p><p><strong>Q2: What are your thoughts on being prescriptive versus flexible when writing NIST publications?</strong></p><p><strong>A:</strong> That&#8217;s another tough balancing act. Part of the problem is that there are misconceptions that anything NIST produces is mandatory. And that&#8217;s never been the case. NIST is not a regulatory agency and does not have the authority to make things mandatory. Certain documents, FIPS, are mandatory by law. Some documents are made mandatory by OMB or other federal agencies, which is out of NIST&#8217;s control.</p><p>Especially because most NIST documents have to work for so many different audiences, they use a lot of &#8220;should&#8221; language. That&#8217;s intentional, because NIST can&#8217;t possibly anticipate every situation. Generally, &#8220;should&#8221; means that this is a good idea, something you should consider, but if it doesn&#8217;t work for you, that&#8217;s OK.</p><p>Some NIST documents use &#8220;shall&#8221; language, but they are generally defining algorithms or protocols. If you&#8217;re going to implement the protocol in accordance with the document, you <em><strong>must</strong></em> do things this way. There&#8217;s no &#8220;should&#8221; about it.</p><p>In terms of being more prescriptive, the top feedback I get from people is, &#8220;tell us what to do.&#8221; And I wish it was that easy. Because the guidance is used by organizations of all sizes across all sectors around the world, it&#8217;s impossible to give prescriptive, detailed guidance that applies for everybody. There&#8217;s way too much variation. And technology changes way too fast. So we tend to lean on the side of being flexible and put our faith in the readers of the documents to do the right thing. We all know that isn&#8217;t always what happens, but the alternative is to come up with standards or guidelines that are so rigid that nobody&#8217;s going to use them because they&#8217;re going to say, this is impossible, we can&#8217;t do all of this.</p><p><strong>Q3: I had heard that NIST was hesitant to define low, moderate, and high baselines for SP 800-53 because that wasn&#8217;t the intent. Wasn&#8217;t the intent to use it as a framework, a control catalog? With federal baselines, controls aren&#8217;t removed, they&#8217;re added.</strong></p><p><strong>A: </strong>I completely agree with the concerns about defining things like low, moderate, and high. In the mid-2000s I helped develop the <a href="https://www.first.org/cvss/v2/guide">Common Vulnerability Scoring System (CVSS) version 2</a>. It provides a severity score for each software vulnerability. A lot of organizations have used it to prioritize their patching, like having a policy that says every vulnerability with a score of 7 or higher has to be patched within 30 days.</p><p>That was never how CVSS was supposed to be used. CVSS had a base score, which reflected the characteristics that were unlikely to change over time. Base scores are pretty much what every CVSS score you&#8217;ve ever seen is. NIST created the National Vulnerability Database in part to publish those scores so everybody in the world could use them. CVSS also defined temporal scores that were time-sensitive and environmental scores that would be specific to an organization&#8217;s environment. The intention was that organizations would use all three types of scores. They&#8217;d take that base score and apply the additional factors to it to come up with scores that were meaningful for their environment. Unfortunately, hardly any organizations do that; they only use base scores because of the additional resources needed to calculate and update temporal and environmental scores.</p><p>A lot of times, people have the best of intentions with things like creating baselines or developing metrics and thresholds. But the users of the baselines, metrics, and thresholds often don&#8217;t use things the way that the creators intended.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://www.tcannex.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Q4: What&#8217;s a piece of advice you&#8217;d give someone reading a large NIST publication for the first time?</strong></p><p><strong>A:</strong> Expect to read it more than once. Obviously, if you&#8217;ve got a 500-page document, you&#8217;re not going to sit down and read it cover to cover and comprehend it all. I would advise reading such a document a chunk at a time. It&#8217;s no different than reading a large textbook in school. Be prepared to take notes, highlight things, go back and re-read things, and go to other documents to get more information because NIST intentionally tries not to duplicate material across publications. For example, if you&#8217;re reading <a href="https://csrc.nist.gov/pubs/sp/800/63/4/final">SP 800-63-4</a>, it points to other documents. Now you need to find those documents and read them too, at least parts of them.</p><p><strong>Q5: Have there been any surprising disagreements or enlightening moments during the development of a publication that changed your view on a security issue?</strong></p><p><strong>A:</strong> Several years ago, we were <a href="https://csrc.nist.gov/pubs/sp/800/40/r4/final">updating SP 800-40 on patch management</a>. This was through the NIST NCCoE, so we were working with engineers from Microsoft and other tech companies who release patches and help their customers prioritize patches. They have a great deal of experience on that side of things. One of them essentially proposed that we stop worrying so much about prioritizing individual patches. Instead of doing things like assigning a vulnerability score to each patch and then setting the timeframe for addressing patches by score, you have a regular schedule for applying patches unless a patch has exceptional circumstances, like a major zero day that needs patched immediately. You treat patching as technology preventative maintenance, like preventative maintenance on a car.</p><p>The first time I heard that, I thought, that&#8217;s crazy, just throwing away all the hard work that&#8217;s gone into patch and vulnerability metrics and prioritization. I struggled with that for a while, but the more I read about it and the more we talked about it, I ended up switching to that point of view. I&#8217;m now a big advocate for simplifying the prioritization process. Instead of spending so much time and energy trying to prioritize all these vulnerabilities, instead focus on improving the mitigation processes.</p><p>A second example brings together NIST and FedRAMP. One of the policies that I worked on last year for FedRAMP dealt with the conflict where FedRAMP was telling cloud providers that they have to patch in a certain amount of time, and NIST was telling cloud providers that they have to use NIST-validated cryptographic modules. These policies conflict when a provider needs to patch to comply with FedRAMP but the patches aren&#8217;t yet NIST-validated.</p><p>Both agencies had created their policies in support of the laws they are subject to. So how do you come up with a solution that resolves the conflict and provides the best security outcome, while recognizing that these contradictory laws are in place that we&#8217;re all being asked to follow?</p><p>There are times like that where you truly see both sides of the issue. You understand that each side has its obligation and its mission. But you need to do fundamentally what&#8217;s best from a security perspective. And I think in the end, <a href="https://www.fedramp.gov/resources/documents/FedRAMP_Policy_for_Cryptographic_Module_Selection_v1.1.0.pdf">the new policy we created</a> was as helpful as we could be in clearing up the conflict.</p><p><strong>Q6: Do you foresee the role of assessors changing as NIST guidance changes?</strong></p><p><strong>A:</strong> Things sure used to be a lot easier. When I was first working for NIST, we did a lot of checklists, like <a href="https://csrc.nist.gov/pubs/sp/800/68/r1/final">Windows XP security</a>. Here&#8217;s the settings, here&#8217;s what the recommended values are for the settings, and that was pretty much it. That seems quaint now. Now we have these incredibly complex systems with all these third-party services and components, and just <a href="https://www.fedramp.gov/rfcs/0004/">figuring out where the system boundary is for FedRAMP purposes</a> is crazy enough, much less figuring out how to assess it.</p><p>I assume that the role of assessors is going to keep getting tougher. They need to have greater and greater understanding of a wider variety of technologies, how they work together, and how the security controls do or don&#8217;t carry across those intersections of those technologies. I don&#8217;t envy assessors their jobs at all.</p><p><strong>Q7: Of all of the publications you&#8217;ve contributed to, which one are you the most proud of, and why?</strong></p><p>A: I&#8217;m the most proud of <a href="https://csrc.nist.gov/pubs/sp/800/61/final">NIST SP 800-61, the incident handling guide</a>. That was the first NIST publication that I wrote back in 2003. At that time, most organizations didn&#8217;t have any incident response capabilities, programs, or policies. I&#8217;d previously worked in a security operations center, reviewing intrusion detection alerts and aiding in clients&#8217; incident responses. When I wrote the incident handling guide, I combined my experience with the limited information out there from CERT and a few other organizations, melded those concepts and fleshed them out a bit, and came up with a guide for organizations just starting out in incident handling.</p><p>And it took off. It ended up becoming this foundational document that was cited close to a thousand times. Then I was fortunate enough over the years to assist NIST with all the updates. We just <a href="https://csrc.nist.gov/pubs/sp/800/61/r3/final">released revision 3 earlier this year</a>, which made the shift to a CSF 2.0 profile. Even with all those changes, the basic concepts from 2003 are still there. The iterations of SP 800-61 have been some of NIST&#8217;s most downloaded documents, so I&#8217;m really proud not only that I created the original, but that all these years later, the updates are still in use, and people are still finding value in them.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is 100% reader-supported. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Details on the risk management API ]]></title><description><![CDATA[Last week we announced the alpha release of the TCAnnex API.]]></description><link>https://www.tcannex.com/p/details-on-the-risk-management-api</link><guid isPermaLink="false">https://www.tcannex.com/p/details-on-the-risk-management-api</guid><dc:creator><![CDATA[Matthew Smith]]></dc:creator><pubDate>Mon, 06 Oct 2025 14:02:55 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XYOd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Last week we <a href="https://www.tcannex.com/p/big-news-an-api-for-nist-risk-management">announced</a> the alpha release of the TCAnnex API. Now we&#8217;re excited to provide a little more detail as to how the API works and what it can do from a technical perspective. If you haven&#8217;t already, head to our <a href="https://shop.tcannex.com/b/9bsC4">shop</a> to download a key. The key is free for TCAnnex Substack Founders or $75 for 2025 access for non-founders.</p><h3>Introduction</h3><p>The API has two main endpoints: /documents and /elements. /documents is the main entry point for the API. Every API call will require you to use your key. It&#8217;s passed through the HTTP GET parameter &#8220;api_key&#8221;. For the rest of the documentation, we&#8217;ll assume you&#8217;re passing the parameter and will omit it.</p><h3>Data Format</h3><p>The return format for every HTTP GET request will be a JSON object. That object will ALWAYS be a NIST CPRT JSON object validated against the CPRT Schema. This format allows for the traversal of the API utilizing the &#8220;doc_identifier&#8221; and subsequent &#8220;element_identifiers&#8221;. Read more about the format <a href="https://csrc.nist.gov/projects/cprt/learn">here</a>. View the JSON Schema <a href="https://csrc.nist.gov/csrc/media/Projects/cprt/documents/schema/cprt_schema.json">here</a>. </p><p>The basics are that the top-level JSON object is a set of four lists: documents, elements, relationships, and relationship_types. These four lists allow for the representation of not only the document, its metadata, and its constituent elements, but also the way in which those elements relate to one another. Essentially, this information creates a graph of the risk management data. </p><p>In the future, this property of the data format will become powerful when traversing networks of documents. For now, it is simply used for expressing the internal structure of the documents (which in itself is useful for discovery and analysis). </p><h3>/documents</h3><p>The /documents endpoint is the entry point for the TCAnnex API. This call is specifically designed for document discovery. If you simply issue an HTTP GET request to /documents, you will get a JSON object with all currently available documents. Note that the entire set of elements, relationships, and relationship_types will NOT be returned. However, this set of doc_identifiers will be used to further target future requests.  </p><p>Example: HTTP GET &#8220;api.tcannex.com/documents&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XYOd!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XYOd!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png 424w, https://substackcdn.com/image/fetch/$s_!XYOd!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png 848w, https://substackcdn.com/image/fetch/$s_!XYOd!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png 1272w, https://substackcdn.com/image/fetch/$s_!XYOd!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XYOd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png" width="629" height="401" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:401,&quot;width&quot;:629,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!XYOd!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png 424w, https://substackcdn.com/image/fetch/$s_!XYOd!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png 848w, https://substackcdn.com/image/fetch/$s_!XYOd!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png 1272w, https://substackcdn.com/image/fetch/$s_!XYOd!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66d476fa-7562-42c7-b72b-bb86d171fa17_629x401.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>(results truncated)</p><p>From that list, you can navigate to a given document using /documents/&lt;doc_identifier&gt;. Issuing a request to a valid doc_identifier endpoint will return a JSON object of all elements within that document and the structure of the document through the relationship objects. In other words, the entire set of elements, relationships, and relationship_types will be returned. This set of objects allows you to programmatically re-create, view, or integrate the structure of the document into your processes.</p><p>Example: HTTP GET &#8220;api.tcannex.com/documents/CSF_1_0_0&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SXYL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SXYL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png 424w, https://substackcdn.com/image/fetch/$s_!SXYL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png 848w, https://substackcdn.com/image/fetch/$s_!SXYL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png 1272w, https://substackcdn.com/image/fetch/$s_!SXYL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SXYL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png" width="726" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:726,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!SXYL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png 424w, https://substackcdn.com/image/fetch/$s_!SXYL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png 848w, https://substackcdn.com/image/fetch/$s_!SXYL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png 1272w, https://substackcdn.com/image/fetch/$s_!SXYL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb70d63-46d9-4315-ac4e-e49eb2d185d6_726x576.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>(results truncated)</p><h3>/elements</h3><p>The /elements entry point is for fine-grained access to elements within a document. Every element can be uniquely identified with a doc_identifier and an element_identifier. Issuing an HTTP GET request to /elements/&lt;doc_identifier&gt;/&lt;element_identifier&gt; will return the information only relevant to that element.</p><p>Example: HTTP GET &#8220;api.tcannex.com/elements/CSF_1_0_0/RC.RP-1&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YFJ2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YFJ2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png 424w, https://substackcdn.com/image/fetch/$s_!YFJ2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png 848w, https://substackcdn.com/image/fetch/$s_!YFJ2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png 1272w, https://substackcdn.com/image/fetch/$s_!YFJ2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YFJ2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png" width="612" height="549" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:549,&quot;width&quot;:612,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!YFJ2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png 424w, https://substackcdn.com/image/fetch/$s_!YFJ2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png 848w, https://substackcdn.com/image/fetch/$s_!YFJ2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png 1272w, https://substackcdn.com/image/fetch/$s_!YFJ2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26126cc6-81fa-4492-8bba-0fc63a92063b_612x549.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>These results are not truncated and show the full CPRT JSON object. The relationships list will contain all relationships that element has, whether the element is a destination or source of the relationship.</p><p>For astute observers, you will notice that the relationship represented ties the element RC.RP-1 (CSF Subcategory) to the element RC.RP (CSF Category). These relationships allow for programmatic walking, building, or discovery of structure within or between documents and elements. </p><h3>Conclusion</h3><p>The current list of endpoints serves as a general mechanism to discover valid documents (and document-related metadata) as well as detailed mechanisms to navigate and use the data within those documents. We have already built internal and client-facing applications using this API and data format that have streamlined our ability to effectively and efficiently deliver risk management results. We are excited to hear from you! Email info@tcannex.com to learn more or provide feedback. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is 100% reader-supported. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Big news: an API for NIST risk management documents]]></title><description><![CDATA[Delivering high-integrity data in a machine-readable format directly to you]]></description><link>https://www.tcannex.com/p/big-news-an-api-for-nist-risk-management</link><guid isPermaLink="false">https://www.tcannex.com/p/big-news-an-api-for-nist-risk-management</guid><dc:creator><![CDATA[Matthew Smith]]></dc:creator><pubDate>Thu, 02 Oct 2025 19:30:09 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c2eb6380-605e-4637-944c-a42a3d4ce61a_1356x1540.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Over the years, there&#8217;s been a push to &#8220;liberate the data&#8221; within risk management documentation. We&#8217;ve seen a move from scanned-in PDF files to modern PDF files, to Excel spreadsheets, to some JSON-readable formats. This progress has been fantastic, but we&#8217;re still seeing most organizations use custom-made, non-standard spreadsheets to manage their risk.</p><p>TCAnnex has seen and helped organizations use many different documents to manage risk, and most organizations are facing steep learning curve challenges when integrating these documents into their business processes. As we all know, spreadsheets are where most of the work gets done. We&#8217;ve seen countless businesses creating bespoke spreadsheets from documents (in whatever data format they can get their hands on). However, these spreadsheets usually become unwieldy over time, with lots of inconsistencies and the need for periodic manual reviews and updates, especially as risk management documents are revised.</p><p>To mitigate the inconsistency risk, TCAnnex is proud to announce the <a href="https://shop.tcannex.com/b/9bsC4">alpha version of our risk management document API</a>! This API allows users to access the data within 11 major NIST documents with direct, repeatable calls. This API solves the problem of not having a single source of ground truth. Furthermore, the API creates a platform on which to innovate and bring these documents into further alignment and create powerful new tools.</p><p>TCAnnex has painstakingly curated each of the 11 documents (listed below) into a common format, a single database, and a common programmatic way of accessing them. It is now possible to tie together disparate NIST documents into your own risk management processes and tools with confidence, knowing that you will always have consistent, high-integrity data. We hope to spur innovation in this space by lowering the barrier to entry for using these documents.</p><p>The API is now available for TCAnnex founding members at no additional cost. Message info@tcannex.com to get your founder discount coupon. <a href="https://shop.tcannex.com/b/9bsC4">The API is available</a> to everyone else for the remainder of 2025 for $75 (USD). </p><p>We&#8217;re excited to deliver this platform to you and are deeply interested in your feedback (contact us at info@tcannex.com). We anticipate updating the list of available documents, relationships between those documents, and other features to make risk management guidance more usable. </p><ul><li><p>Artificial Intelligence Risk Management Framework (AI RMF 1.0)</p></li><li><p>Framework for Improving Critical Infrastructure Cybersecurity 1.0 (CSF 1.0)</p></li><li><p>Framework for Improving Critical Infrastructure Cybersecurity 1.1 (CSF 1.1)</p></li><li><p>The NIST Cybersecurity Framework (CSF) 2.0</p></li><li><p>National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (2017)</p></li><li><p>Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) Components 1.0.0</p></li><li><p>Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) Components 2.0.0</p></li><li><p>NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0</p></li><li><p>Mitigating the Risk of Software Vulnerabilities by Adopting a Secure Software Development Framework (SSDF 1.0)</p></li><li><p>Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities</p></li><li><p>Information and Communications Technology (ICT) Risk Outcomes: Integrating ICT Risk Management Programs with the Enterprise Risk Portfolio</p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is 100% reader-supported. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Q&A on cyber writing for NIST]]></title><description><![CDATA[I recently did a Q&A session with members of Cybersecurity Club on my experiences writing for NIST, and I had the best time!]]></description><link>https://www.tcannex.com/p/q-and-a-on-cyber-writing-for-nist</link><guid isPermaLink="false">https://www.tcannex.com/p/q-and-a-on-cyber-writing-for-nist</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Mon, 22 Sep 2025 13:03:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7114f289-1f25-4470-ac38-cd4146b6d206_2000x1500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I recently did a Q&amp;A session with members of <a href="https://cybersecurityclub.substack.com/p/join-cybersecurity-club-for-knowledge-aea">Cybersecurity Club</a> on my experiences writing for NIST, and I had the best time! With their kind permission, I&#8217;m sharing edited highlights from that Q&amp;A with you, including a big announcement about an upcoming NIST-related project we&#8217;ll be doing at the Annex. </p><p>You can join Cybersecurity Club <a href="https://discord.gg/sZR96wyQKY">through their Discord</a> for &#8220;knowledge, networking, and hands-on learning.&#8221;</p><p><strong>Q1: Can you tell us about your background?</strong></p><p><strong>A:</strong> I've been working in IT since the early 90s. I have master's degrees in computer science and technical writing. I've specialized in cybersecurity for 25 years. I've done everything from technical support, training, and auditing to system administration, security architecture/engineering, intrusion detection signature development, and of course security writing and research.</p><p>I started supporting NIST as a contractor in 2003, and my first project was writing new guidance on incident response. This was so long ago that most organizations didn't have incident response capabilities. The result was <a href="https://csrc.nist.gov/pubs/sp/800/61/final">SP 800-61, </a><em><a href="https://csrc.nist.gov/pubs/sp/800/61/final">Computer Security Incident Handling Guide</a></em>, which became one of the foundational documents that many organizations used to stand up their first incident response capabilities.</p><p>In 2006 I became a NIST employee for four years. I did a lot of vulnerability scoring and metrics research, and I co-authored <a href="https://www.first.org/cvss/v2/guide">CVSS v2 (the Common Vulnerability Scoring System)</a> and similar systems for scoring <a href="https://csrc.nist.gov/pubs/ir/7502/final">software misconfiguration (CCSS)</a> and <a href="https://csrc.nist.gov/pubs/ir/7864/final">misuse (CMSS) vulnerabilities</a>. I left NIST because of the three-hour-a-day commute. Since then I've been self-employed as a freelance cyber writer, with NIST as one of my clients.</p><p>I've <a href="https://www.scarfonecybersecurity.com/?publication=NIST">co-authored over 150 NIST publications</a> since 2003. Recent ones include the <a href="https://csrc.nist.gov/pubs/sp/800/218/final">Secure Software Development Framework (SSDF)</a> and the <a href="https://csrc.nist.gov/pubs/cswp/29/the-nist-cybersecurity-framework-csf-20/final">Cybersecurity Framework (CSF) 2.0</a>.</p><p><strong>Q2: What your role is in relation to the NIST guidelines?</strong></p><p><strong>A:</strong> My role varies a lot from one NIST guideline to another. Sometimes I'm helping mainly with the writing. I make sure the documents are technically accurate and clear and that the writing is crisp and easy to understand. I help make the documents more usable. Sometimes I'm digging into the technical topic, giving myself a crash course and thinking about what would be helpful for people to know.</p><p>One super-cool thing about the NIST documents is that almost all of them go out for public comment. NIST literally invites everyone in the world to read the draft and share their insights. Most NIST documents are not specific to the US federal government; they're meant to be used by any organization anywhere in the world.</p><p><strong>Q3: What are the top three mistakes you see commonly made in the wild when implementing the guides?</strong></p><p><strong>A:</strong> Probably the biggest mistake I see is when people think that the recommendations in the guides are really requirements. We purposely use "should" language to say, this is a good idea and something you should do if it's reasonable, but it's not always necessary. Unfortunately, a lot of people treat the recommendations as requirements, and they think they have to do every "should" item or they'll be violating the NIST standard.</p><p>With just a few exceptions, such as NIST standards for cryptographic algorithms and protocols, NIST guidance is meant to <strong>help</strong> organizations but not <strong>mandate</strong> what they do. It's impossible to write a guideline that is full of requirements and that will work for every organization, large or small, all sectors, around the world. For example, conventional wisdom is that every company needs a written set of cybersecurity policies&#8230;but I&#8217;m self employed, so I don&#8217;t. The goal is to encourage organizations to do what's helpful and prudent, not to waste time on busywork.</p><p>Another common mistake I see is that people often aren&#8217;t aware of static content becoming dated. People sometimes assume that if the publication hasn't been retired, it's all up to date. It's a reasonable assumption, but unfortunately it's often wrong. The publication may have info that's become false, or there may be significant new developments missing altogether.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tcannex.com/subscribe?"><span>Subscribe now</span></a></p><p><strong>Q4: We heard that you are planning to update <a href="https://csrc.nist.gov/pubs/sp/800/115/final">NIST SP 800-115, Technical Guide to Information Security Testing and Assessment</a>. It has been over 15 years since the release of SP 800-115. What is prompting the update now in 2025?</strong></p><p><strong>A:</strong> Because of changes from the new administration, I'm not directly supporting NIST much these days. There's not much funding for contractors, so I'm mainly working on my own and that includes doing things that supplement what NIST does. For example, my colleague Matthew Smith and I at Trusted Cyber Annex have been <a href="https://www.tcannex.com/p/full-set-of-cheat-sheets-for-nists">"annotating" the new NIST Digital Identity Guidelines</a> to make them easier and faster for readers to understand and use, and releasing those annotated versions for free.</p><p>The original SP 800-115 hasn&#8217;t been updated since its original release in 2008. NIST doesn&#8217;t currently have the resources (staff or budget) to be updating publications like 800-115. But I have heard time and time again that many organizations, both inside and outside the federal government, are still using it. Some even require its use.</p><p>That's not so bad because like most of the NIST guides I've worked on, 800-115 does not address specific tools or technologies. It doesn't provide low-level information on how to do things because that changes so quickly and is so different across organizations, platforms, and such. 800-115 has a lot of stable material like defining basic terms, explaining basic techniques at a high level, and defining approaches for conducting testing and assessments. And much of that may still be OK today.</p><p>But a lot of 800-115, especially the appendices, is badly outdated: broken links, content that's no longer relevant, and a lot of developments since 2008 (hello, cloud! hello, AI!) that aren't covered much or at all in 800-115.</p><p>So what we'd like to do at the Annex is update 800-115 to bring it to the current day. NIST publications aren't copyrighted, so we can just take what's released as a starting point, then share drafts with the community and get their feedback on what would help them in regards to security testing and assessment. Think of it this way. If your employer or client said "hey, you have to comply with this publication," what would you want to have to comply with that would be genuinely useful and reasonable?</p><p><strong>Q5: What are the biggest changes that need to be made to SP 800-115 from your point of view? What needs to be added/removed/revised the most?</strong></p><p><strong>A:</strong> Obviously strike all the outdated material (like the appendix on what tools to include in a "live distribution CD").More broadly, recognize that a lot of the basic concepts we needed to explain in 2008, because they were new to so many people, are now second-nature to people. I think we can escalate our assumptions. It's safe to assume that people know a lot more of the basics than they used to. But that also means we need to identify what more advanced topics would be helpful for them instead.</p><p>I'd also like to make 800-115 more usable. For example, add separate forms and templates that supplement the 800-115 content. Another thought is to put links to resources on a webpage so they can be updated asynchronously from updating 800-115 itself.</p><p><strong>Q6: If others want to get involved with NIST security research, what would be the steps for them to do so?</strong></p><p><strong>A: </strong>The best way to help NIST, besides yelling at Congress to increase their funding, is to read their publications, spread the word about all the great work they do (on a shoestring budget), and if you're knowledgeable about a topic they have a draft publication on, providing them feedback. You can access the full NIST cybersecurity library and sign up for their mailing lists at <a href="https://csrc.nist.gov">https://csrc.nist.gov</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is 100% reader-supported. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Full set of cheat sheets for NIST's Digital Identity Guidelines]]></title><description><![CDATA[Annotations and term definitions embedded in the PDFs]]></description><link>https://www.tcannex.com/p/full-set-of-cheat-sheets-for-nists</link><guid isPermaLink="false">https://www.tcannex.com/p/full-set-of-cheat-sheets-for-nists</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Thu, 04 Sep 2025 12:31:03 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PWPc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Today we released our <a href="https://shop.tcannex.com/b/QFB8U">annotated version of NIST SP 800-63C-4, Federation and Assertions</a>. This completes our full set of human-created <a href="https://shop.annex.com">annotated versions of NIST&#8217;s </a><em><a href="https://shop.annex.com">Digital Identity Guidelines</a></em><a href="https://shop.annex.com"> series</a>. As the excerpt below from 800-63C-4 shows, our &#8220;cheat sheets&#8221; add the NIST definition of each term the first time it&#8217;s used. The cheat sheets also highlight the recommendations and other info that, in our opinion, are most important for readers.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PWPc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PWPc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic 424w, https://substackcdn.com/image/fetch/$s_!PWPc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic 848w, https://substackcdn.com/image/fetch/$s_!PWPc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic 1272w, https://substackcdn.com/image/fetch/$s_!PWPc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PWPc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic" width="1456" height="1365" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1365,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:440503,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.tcannex.com/i/172676067?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PWPc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic 424w, https://substackcdn.com/image/fetch/$s_!PWPc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic 848w, https://substackcdn.com/image/fetch/$s_!PWPc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic 1272w, https://substackcdn.com/image/fetch/$s_!PWPc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ebad708-a55f-439f-b04e-cb555a1c1786_1784x1672.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><a href="https://shop.tcannex.com">Download the new cheat sheets for free</a> and share them as you&#8217;d like. Thanks to everyone who&#8217;s already downloaded the earlier cheat sheets. We appreciate your support&#8212;from all over the US, plus Australia, Belgium, Brazil, Canada, Greece, Poland, Saudi Arabia, Spain, the UK, and the United Arab Emirates! </p><p>If you have suggestions for improving our annotations, please send them to team@tcannex.com. We love hearing from you!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is 100% reader-supported. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Introducing ourselves]]></title><description><![CDATA[Actual people, not chatbots!]]></description><link>https://www.tcannex.com/p/introducing-ourselves</link><guid isPermaLink="false">https://www.tcannex.com/p/introducing-ourselves</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Tue, 26 Aug 2025 15:03:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-QpR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hello, world! We&#8217;re the co-founders of Trusted Cyber Annex. We&#8217;re deeply committed to publishing free, high-quality cybersecurity content that people can rely on. Our goal is to help counter the effects of bogus &#8220;facts,&#8221; AI-generated slop, and <a href="https://www.whitehouse.gov/wp-content/uploads/2025/07/Americas-AI-Action-Plan.pdf">missives from the White House</a> prohibiting federal agencies from using words like &#8220;misinformation.&#8221; We&#8217;re focused on doing work we enjoy that helps others.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-QpR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-QpR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-QpR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-QpR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-QpR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-QpR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:250823,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.tcannex.com/i/170806270?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd5a67ab7-dc6b-49ca-83f7-664fa0381a9d_1742x1742.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!-QpR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-QpR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-QpR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-QpR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87cd4fde-fa9e-4a44-a004-5d19a298af52_1742x1742.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image: Jono Hey, <a href="https://sketchplanations.com/find-your-why-not">Sketchplanations</a></figcaption></figure></div><p>Here&#8217;s a quick intro to us so you know a little about the people behind the words.</p><h3>Karen Scarfone</h3><p><strong>Credentials:</strong> I&#8217;ve been working in cybersecurity since 1999, most notably <a href="https://csrc.nist.gov">supporting NIST</a> for 22 years. My <a href="https://www.scarfonecybersecurity.com">cyber writing portfolio</a> contains over 150 NIST publications, including the <a href="https://www.nist.gov/cyberframework">Cybersecurity Framework (CSF) 2.0</a>, plus hundreds of print and online articles, and contributions to 21 books. My passion is absorbing highly technical cybersecurity concepts and translating them for broader audiences to understand. I even got a rare Master of <em>Science</em> degree in English (tech writing) to improve the quality of my work.</p><p><strong>Everything else:</strong> I&#8217;m a GenX geek who still loves listening to new wave, post-punk, and goth and is staunchly pro-oxford comma and pro-Lego. My sports obsessions are the Washington Capitals and the Winter Olympics (you can never watch enough curling). I&#8217;m learning how to play the piano again after a 35-year hiatus. My mission in life is to pay forward all the help that so many people have given me over the years.</p><h3>Matthew Smith</h3><p><strong>Credentials:</strong> I&#8217;ve been working in cybersecurity since 2010. I have worked in the intelligence community, federal civil departments and agencies, and the private sector. I am an author of <a href="https://csrc.nist.gov/pubs/ir/8286/final">NIST IR 8286, 8286A, and 8286C</a> (Enterprise risk management pubs), <a href="https://www.nist.gov/cyberframework/framework-version-10">CSF 1.0</a> and <a href="https://www.nist.gov/cyberframework/csf-11-archive">1.1</a>, along with a smattering of other publications. I also write about <a href="https://www.techtarget.com/contributor/Matthew-Smith">AI governance and risk mitigation over on TechTarget</a> while serving as vCISO for a few telecommunications companies.</p><p><strong>Everything else:</strong> I&#8217;m technically a Millennial with X tendencies (latch key for life!). I play arcade games and darts in my free time while cheering on the local soccer team. My newer hobbies include cooking and trying to not kill plants. My motto is: think big thoughts, feel big feelings, help when you can. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is a reader-supported publication. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Cheat sheets for NIST's Digital Identity Guidelines]]></title><description><![CDATA[Annotations and term definitions embedded in the PDFs]]></description><link>https://www.tcannex.com/p/cheat-sheets-for-nists-digital-identity</link><guid isPermaLink="false">https://www.tcannex.com/p/cheat-sheets-for-nists-digital-identity</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Tue, 19 Aug 2025 14:33:23 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!V2TD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Today we released <a href="https://shop.tcannex.com">our second annotated versions of NIST&#8217;s </a><em><a href="https://shop.tcannex.com">Digital Identity Guidelines</a></em><a href="https://shop.tcannex.com"> series</a>. As the excerpt below shows, our revamped &#8220;cheat sheets&#8221; for SPs 800-63-4, 800-63A-4, and 800-63B-4 add the NIST definition of each term the first time it&#8217;s used. Our beta tester (thank you, Bill!) found this invaluable for absorbing the content faster and more accurately. The cheat sheets also highlight the recommendations and other info that, in our opinion, are most important for readers.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!V2TD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!V2TD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg 424w, https://substackcdn.com/image/fetch/$s_!V2TD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg 848w, https://substackcdn.com/image/fetch/$s_!V2TD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!V2TD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!V2TD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg" width="1742" height="1588" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1588,&quot;width&quot;:1742,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:903110,&quot;alt&quot;:&quot;Excerpt of annotated page from SP 800-63-4, with highlighted text and inserted definitions&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.tcannex.com/i/171318937?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f05fcb3-24d2-43af-931c-551094ca6ac7_2272x1754.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Excerpt of annotated page from SP 800-63-4, with highlighted text and inserted definitions" title="Excerpt of annotated page from SP 800-63-4, with highlighted text and inserted definitions" srcset="https://substackcdn.com/image/fetch/$s_!V2TD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg 424w, https://substackcdn.com/image/fetch/$s_!V2TD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg 848w, https://substackcdn.com/image/fetch/$s_!V2TD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!V2TD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb81532e4-f643-408f-8563-8fe4b817a5e8_1742x1588.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We&#8217;re working on a version of 800-63C-4, but we didn&#8217;t want that to delay releasing the other volumes. Stay tuned for it in the coming weeks.</p><p><a href="https://shop.tcannex.com">Download the new cheat sheets for free</a> and share them as you&#8217;d like. And if you have suggestions for improvement, please send them to team@tcannex.com. We love hearing from you!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is 100% reader-supported. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Annotated NIST pub on authentication]]></title><description><![CDATA[Speed up your reading of 800-63B-4]]></description><link>https://www.tcannex.com/p/annotated-nist-pub-on-authentication</link><guid isPermaLink="false">https://www.tcannex.com/p/annotated-nist-pub-on-authentication</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Mon, 11 Aug 2025 12:45:26 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/49ed3a1a-6f95-4f33-9d68-6ac6a6b3da88_1695x2213.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We&#8217;ve released an annotated version of NIST&#8217;s new SP 800-63B-4, <em>Digital Identity Guidelines: Authentication and Authenticator Management</em>. It&#8217;s the follow-on to<a href="https://www.tcannex.com/p/annotated-nist-sp-800-63-4"> our annotated version of the foundational 800-63 document, </a><em><a href="https://www.tcannex.com/p/annotated-nist-sp-800-63-4">Digital Identity Guidelines</a></em>. The annotations indicate each publication&#8217;s recommendations, definitions, and other information that, in our opinion, are most significant for readers. The annotations are intended to expedite, not replace, reading the NIST documents.</p><p><a href="https://shop.tcannex.com/b/sa8MH">Download the annotated version for free</a> (from <a href="https://shop.tcannex.com">our new document shop!</a>) and share it as you&#8217;d like. We need community feedback to validate what&#8217;s working and find out what we can improve next time. Send any suggestions you have regarding the annotations to team@tcannex.com.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is 100% reader-supported. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Annotated version of NIST's Digital Identity Guidelines]]></title><description><![CDATA[Absorb the new SP 800-63-4 faster]]></description><link>https://www.tcannex.com/p/annotated-nist-sp-800-63-4</link><guid isPermaLink="false">https://www.tcannex.com/p/annotated-nist-sp-800-63-4</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Mon, 04 Aug 2025 12:30:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/dd65da07-1a02-48f5-82da-80a1bd2a885d_1220x1786.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We&#8217;ve released an annotated version of NIST&#8217;s <em>Digital Identity Guidelines</em>, SP 800-63-4. It&#8217;s the latest in our <a href="https://www.tcannex.com/t/annotations">series of NIST annotations</a>. The annotations indicate the publication&#8217;s recommendations, definitions, and other information that, in our opinion, are most significant for readers. The annotations are intended to expedite, not replace, reading the NIST document.</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail" src="https://substackcdn.com/image/fetch/$s_!M7af!,w_400,h_600,c_fill,f_auto,q_auto:best,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4daafca1-8795-4982-9ccf-bc44435c7a60_1220x1786.png"></image><div class="file-embed-details"><div class="file-embed-details-h1">tcannex_annotated_NIST_SP_800_63_4.pdf</div><div class="file-embed-details-h2">1.51MB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.tcannex.com/api/v1/file/6aae81b4-2029-4aef-b484-7b2f5f545fb8.pdf"><span class="file-embed-button-text">Download</span></a></div><div class="file-embed-description">TCAnnex annotated version of NIST SP 800-63-4</div><a class="file-embed-button narrow" href="https://www.tcannex.com/api/v1/file/6aae81b4-2029-4aef-b484-7b2f5f545fb8.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p>Download the annotated version and share it as you&#8217;d like. We need community feedback to validate what&#8217;s working and find out what we can improve next time. Send feedback on the annotations to karen@tcannex.com, and let us know what app/platform combo you used to view the annotated version.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is 100% reader-supported. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Annotated NIST publication on media sanitization]]></title><description><![CDATA[Expediting your review of draft SP 800-88 Revision 2]]></description><link>https://www.tcannex.com/p/annotated-nist-publication-on-media</link><guid isPermaLink="false">https://www.tcannex.com/p/annotated-nist-publication-on-media</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Thu, 31 Jul 2025 13:32:05 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/056bfe69-f702-4444-8983-ec9277f381bc_1370x1634.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We&#8217;ve released our second annotated NIST publication, this time with SP 800-88r2, <em>Guidelines for Media Sanitization</em>. SP 800-88r2 provides recommendations for establishing a media sanitization program for an organization. We&#8217;ve annotated NIST&#8217;s PDF to indicate, in our opinion, which portions are most significant for people who want to read it or submit public comments on it to NIST. The annotations are intended to expedite, not replace, reading the original NIST document.</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail" src="https://substackcdn.com/image/fetch/$s_!l3GB!,w_400,h_600,c_fill,f_auto,q_auto:best,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8f021a3-b2f4-4031-a10d-7f4117d08194_1370x1634.png"></image><div class="file-embed-details"><div class="file-embed-details-h1">tcannex_annotated_NIST_SP_800_88r2_ipd.pdf</div><div class="file-embed-details-h2">1.51MB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.tcannex.com/api/v1/file/12892895-68e5-49bf-a3c0-2acb69f9d645.pdf"><span class="file-embed-button-text">Download</span></a></div><div class="file-embed-description">TCAnnex annotated version of NIST SP 800-88 Revision 2, initial public draft</div><a class="file-embed-button narrow" href="https://www.tcannex.com/api/v1/file/12892895-68e5-49bf-a3c0-2acb69f9d645.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p>Download the annotated version and share it as you&#8217;d like. We need community feedback to validate what&#8217;s working and find out what we can improve next time. Send feedback on the annotations to karen@tcannex.com, and let us know what app/platform combo you used to view the annotated version.</p><p>This annotation project is independent of NIST. You can <a href="https://csrc.nist.gov/pubs/sp/800/88/r2/ipd">provide feedback directly to NIST on their original publication</a> by August 29th.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is 100% reader-supported. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Part 1 - Securing AI use in your organization]]></title><description><![CDATA[Cyber risk management when AI is present]]></description><link>https://www.tcannex.com/p/part-1-securing-ai-use-in-your-organization</link><guid isPermaLink="false">https://www.tcannex.com/p/part-1-securing-ai-use-in-your-organization</guid><dc:creator><![CDATA[Matthew Smith]]></dc:creator><pubDate>Tue, 29 Jul 2025 16:01:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!m_EK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The AI use case that organizations are most likely to face today is adjusting their cybersecurity risk management to account for the presence of AI. It&#8217;s the second of the four use cases defined in my <a href="https://www.tcannex.com/p/part-0-cybersecurity-when-ai-is-present">previous article</a> and is illustrated in the diagram.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!m_EK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!m_EK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png 424w, https://substackcdn.com/image/fetch/$s_!m_EK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png 848w, https://substackcdn.com/image/fetch/$s_!m_EK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png 1272w, https://substackcdn.com/image/fetch/$s_!m_EK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!m_EK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png" width="858" height="347" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:347,&quot;width&quot;:858,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:33475,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!m_EK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png 424w, https://substackcdn.com/image/fetch/$s_!m_EK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png 848w, https://substackcdn.com/image/fetch/$s_!m_EK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png 1272w, https://substackcdn.com/image/fetch/$s_!m_EK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F84bca749-39c8-4f74-8f15-5898d7744f7d_858x347.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In this use case, there&#8217;s an organization of some sort with employees. The employees include developers seeking to take advantage of the benefits of AI Agents. The developers could also be termed &#8220;users&#8221; since I&#8217;m not discussing the development of the actual AI Agent, but the use of the deployed AI Agent. There are two possible scenarios: the developers are using a static AI Agent which has been deployed within the organization, or they are using an AI Agent which is available outside of the organization. </p><p>The typical use case for either of these scenarios is that the developer will issue a prompt to these AI Agents and receive a response. These interactions are represented by the arrows in the figure above. I&#8217;m going to expand on this figure to demonstrate typical information flows and what risks arise from them. </p><p>The figure below includes a database of organizational knowledge. This database may contain FAQs, business processes, data files, etc. This type of system where an AI Agent has access to your internal (or other) data and uses that data to make better decisions is called <em>retrieval augmented generation (RAG)</em>. RAG systems are common in modern AI Agent architectures, as they help the agent produce better results. This architecture can be expanded to include other AI Agents. The main concept is that the AI Agent is using other tools in order to make better decisions with the request it was given. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7zLM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7zLM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png 424w, https://substackcdn.com/image/fetch/$s_!7zLM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png 848w, https://substackcdn.com/image/fetch/$s_!7zLM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png 1272w, https://substackcdn.com/image/fetch/$s_!7zLM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7zLM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png" width="1368" height="432" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:432,&quot;width&quot;:1368,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:63852,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.tcannex.com/i/168500933?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F691eedbd-bafc-4b96-809a-d6b943d2a615_1434x534.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7zLM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png 424w, https://substackcdn.com/image/fetch/$s_!7zLM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png 848w, https://substackcdn.com/image/fetch/$s_!7zLM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png 1272w, https://substackcdn.com/image/fetch/$s_!7zLM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F13b11cce-11f8-4241-b98d-8c74e913241e_1368x432.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As you can see in the more detailed figure, there are many requests and responses issued to and from AI Agents. Each of these arrows presents risks. Risks, for the purposes of this article, are defined as loss of integrity, confidentiality, or availability (classic cybersecurity triad). </p><p>I&#8217;m going to use a slightly different setup than the traditional &#8220;Risk = likelihood x impact.&#8221; I am positing that risk is event-based (which is not new; see definitions of risk in ISO standards). Specifically, I&#8217;m positing that within cybersecurity, there are nine risk events, the product of (<strong>lose, maintain, gain</strong>) x (<strong>confidentiality, integrity, availability</strong>). Notice that there are negative, neutral, and positive risk events. This setup allows for calculating risk tolerances based on costs in future steps. </p><p>Furthermore, in order to realize a risk (e.g., <strong>lose availability</strong>), an organization must have a method of compromise applied to it AND be susceptible to that method of compromise. Only through meeting those two conditions is the risk event realized. Organizations can then use these conditions and risk events to determine impact of an event. </p><p>I&#8217;m going to use the lack of controls as a susceptible condition, and then talk about controls which may help an organization prevent a method of compromise or mitigate the impact of a realized risk event. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is a reader-supported publication. To receive new posts and support our work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Risk Identification and Analysis</h2><p>For the purposes of the following risk analysis, I&#8217;m going to assume that the AI Agents have no write access to anything within the organization (no file system, cloud, email, etc.). There has already been a tremendous amount of research demonstrating that write access for AI Agents poses significant risk to organizations. While having AI Agents with write access to enterprise assets may be beneficial, they must be extremely well-understood and well-protected. The casual user will not be able to architect and protect these systems with limited resources. Therefore, I&#8217;m assuming an already heightened risk posture against AI Agents to eliminate entire classes of methods of compromise.</p><p>For every request that is present in the figure, the following methods of compromise are relevant:</p><ul><li><p><em><strong>Prompt injection:</strong></em> This method of compromise utilizes an intentional man-in-the-middle type of attack to insert additional language into the prompt in order to achieve a different outcome than the original request. <strong>Integrity of that information is compromised.</strong></p></li><li><p><em><strong>Data leakage:</strong></em> This method of compromise could be intentional or unintentional use of personally identifiable information (PII) or sensitive organizational data within a request. <strong>Confidentiality of that information is compromised.</strong></p></li><li><p><em><strong>Denial of service:</strong></em> This method of compromise involves sending a large number of illegitimate requests to the AI Agent with the purpose of overloading its processing capability, thus rendering it inoperable for legitimate requests. <strong>Availability of that information is compromised.</strong></p></li></ul><p>For every response that is present in the figure, the following methods of compromise are relevant:</p><ul><li><p><em><strong>Insecure AI Agent:</strong></em> This method of compromise involves an AI Agent that has been distributed with features which are not in alignment with the organization. Thus the response will contain information that may be harmful to the organization or others. <strong>Integrity of that information is compromised.</strong></p></li><li><p><em><strong>Hallucinations:</strong></em> This method of compromise involves an AI Agent sending back information within the response that is not factually correct. <a href="https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.600-1.pdf">NIST AI 600-1</a> refers to this behavior as &#8220;confabulation.&#8221; The term &#8220;hallucination&#8221; is a colloquial term and hides the underlying source of this method of compromise (AI Agent training and development). Tell us in the comments if you prefer the term &#8220;hallucination&#8221; or something else. <strong>Integrity of that information is compromised.</strong></p></li></ul><p>I have decomposed the use case into its component parts, methods of compromise. Since there are no controls against these methods, there would be a realized risk of degraded confidentiality, integrity, or availability. I use the classic cybersecurity triad here to ground our analysis in the cybersecurity domain rather than generic risk management. Furthermore, these risk events will have an impact associated with them. Your organization can then use impacts with the below responses, costs, and risk tolerances to determine appropriate actions.</p><h2>Risk Responses</h2><p>Given the risk event and impacts, what can be done to prevent or mitigate the realized risks? The list of responses below is not exhaustive but a good starting point for an organization seeking to mitigate risks. Additionally, the costs of these risk responses vary. Depending on the risk events defined above, an organization can weigh the costs of the response against the impact of the risk event in whatever manner is best for the organization.</p><ul><li><p>For prompt injection:</p><ul><li><p>Never copy and paste prompts from untrusted/unknown sources.</p></li><li><p>Ensure only authorized and authenticated users are making requests.</p></li><li><p>Validate and sanitize all user inputs before they reach the AI Agent.</p></li><li><p>Use structured formats that clearly separate instructions from user data.</p></li></ul></li><li><p>For data leakage:</p><ul><li><p>Validate and sanitize all user inputs before they reach the AI Agent.</p></li><li><p>Monitor AI Agent requests for anomalous behavior.</p></li></ul></li><li><p>For denial of service:</p><ul><li><p>Implement rate limiting of requests based on known processing capabilities.</p></li><li><p>Implement rate limiting of requests based on known token or request caps.</p></li><li><p>Implement load balancing.</p></li></ul></li><li><p>For insecure AI Agents:</p><ul><li><p>Create clear requirements for AI Agents before deployment.</p></li><li><p>Monitor responses for inappropriate content.</p></li></ul></li><li><p>For hallucinations:</p><ul><li><p>Validate and sanitize all AI Agent responses before they reach the user.</p></li><li><p>Provide clear disclaimers to users about the limitations of AI Agents.</p></li><li><p>Allow the AI Agent to say &#8220;I don&#8217;t know&#8221; in prompts.</p></li><li><p>Ask for &#8220;chain of thought&#8221; in prompts.</p></li><li><p>Ask for citations for sources in prompts.</p></li></ul></li></ul><h2>Conclusion</h2><p>I have stepped through the use case where an organization has deployed its own AI Agents or uses an external AI Agent. I have identified and analyzed the cybersecurity risks associated with the use case as well as provided some actionable risk responses. Keep in mind that I have taken a fairly technical approach to this writeup. There are many other human-based controls which could be implemented to shore up our risk mitigation strategies. If you have other ideas on how to identify, analyze, or respond to these risks, please drop us a comment!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/p/part-1-securing-ai-use-in-your-organization/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.tcannex.com/p/part-1-securing-ai-use-in-your-organization/comments"><span>Leave a comment</span></a></p>]]></content:encoded></item><item><title><![CDATA[New NIST publication on crypto agility, annotated]]></title><description><![CDATA[Providing an annotated version to expedite review]]></description><link>https://www.tcannex.com/p/new-nist-publication-on-crypto-agility</link><guid isPermaLink="false">https://www.tcannex.com/p/new-nist-publication-on-crypto-agility</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Thu, 24 Jul 2025 14:05:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DrR2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573128ad-dbac-4d9f-a2c9-9cf2ad231174_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Our latest project at Trusted Cyber Annex involves reviewing new NIST draft publications and annotating them to indicate, in our opinion, which portions are most significant for people who want to read the drafts and especially those who want to submit public comments to NIST. The annotations are intended to supplement and expedite, not replace, reading the original NIST documents.</p><p>Today we&#8217;re releasing our first annotation proof-of-concept! It&#8217;s tackling <a href="https://doi.org/10.6028/NIST.CSWP.39.2pd">NIST CSWP 39 on crypto agility strategies and practices</a>. Having crypto agility enables an organization to quickly replace cryptographic algorithms it uses while minimizing the impact on the organization&#8217;s operations and security posture. Download the annotated version below.</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail" src="https://substackcdn.com/image/fetch/$s_!VfSF!,w_400,h_600,c_fill,f_auto,q_auto:best,fl_progressive:steep,g_auto/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F02fb0472-cc07-4bcd-abb1-d6f6f7566716_1370x1612.png"></image><div class="file-embed-details"><div class="file-embed-details-h1">tcannex-annotated-NIST-CSWP-39-2pd</div><div class="file-embed-details-h2">2.27MB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.tcannex.com/api/v1/file/563062fa-1b1a-4235-aaae-6c5f2f0ac413.pdf"><span class="file-embed-button-text">Download</span></a></div><div class="file-embed-description">TCAnnex annotated version of NIST CSWP 39, second public draft</div><a class="file-embed-button narrow" href="https://www.tcannex.com/api/v1/file/563062fa-1b1a-4235-aaae-6c5f2f0ac413.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p>We&#8217;re making it available to everyone, and we need community feedback to validate what&#8217;s working and find out what we can improve next time. Please mail your feedback on the annotations to tcannex@substack.com, and let us know what app/platform combo you used to view the annotated PDF. </p><p>This annotation project is independent of NIST. You can <a href="https://csrc.nist.gov/News/2025/considerations-for-achieving-crypto-agility-2nd-dr">provide feedback directly to NIST on their original publication</a> by August 15th. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is a reader-supported publication. To receive new posts and support our work, become a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Empathy in the age of AI]]></title><description><![CDATA[I recently published an article on Trusted Cyber Annex about AI chatbots not stating technical facts accurately.]]></description><link>https://www.tcannex.com/p/empathy-in-the-age-of-ai</link><guid isPermaLink="false">https://www.tcannex.com/p/empathy-in-the-age-of-ai</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Wed, 23 Jul 2025 13:00:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GUg0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I recently <a href="https://www.tcannex.com/p/do-ai-chatbots-tell-the-truth-eae">published an article on Trusted Cyber Annex</a> about AI chatbots not stating technical facts accurately. I also posted about it on <a href="https://www.reddit.com/r/cybersecurity/comments/1m1dgxr/chatbots_hallucinating_cybersecurity_standards/">Reddit</a> and <a href="https://www.linkedin.com/posts/karenscarfone_all-five-ai-chatbots-in-my-experiment-lied-activity-7351238695020027904-uKN9">LinkedIn</a>.</p><p>What I should have been expecting, but somehow wasn&#8217;t, was that many of the comments blamed the users. Users aren&#8217;t researching each AI model before using it. Users aren&#8217;t doing the necessary prompt engineering (not that most users have even heard of prompt engineering, let alone trained on it). Users are lazy.</p><p>Compare that to the culture and messaging you&#8217;ll find in many media outlets and social media sites, which boils down to: AI can do everything for us. AI makes everything so easy. AI will replace us all.</p><p>Is it any wonder that users are struggling? They&#8217;re being told they&#8217;re becoming irrelevant at the same time they&#8217;re being told to figure out these insanely complex, unpredictable, rapidly evolving, highly technical tools on their own. Why bother? Just get through another day and wait to be laid off.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GUg0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GUg0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png 424w, https://substackcdn.com/image/fetch/$s_!GUg0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png 848w, https://substackcdn.com/image/fetch/$s_!GUg0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png 1272w, https://substackcdn.com/image/fetch/$s_!GUg0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GUg0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png" width="654" height="654" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/37263578-17e6-434c-9116-d292f761b892_654x654.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:654,&quot;width&quot;:654,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:155460,&quot;alt&quot;:&quot;The Law of Unintended Consequences&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.tcannex.com/i/168997586?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Law of Unintended Consequences" title="The Law of Unintended Consequences" srcset="https://substackcdn.com/image/fetch/$s_!GUg0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png 424w, https://substackcdn.com/image/fetch/$s_!GUg0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png 848w, https://substackcdn.com/image/fetch/$s_!GUg0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png 1272w, https://substackcdn.com/image/fetch/$s_!GUg0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F37263578-17e6-434c-9116-d292f761b892_654x654.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Image: Jono Hey, <a href="https://sketchplanations.com/the-law-of-unintended-consequences">Sketchplanations</a></figcaption></figure></div><p>What we all need is more empathy. <em>Empathy</em> is more than feelings; <a href="https://www.merriam-webster.com/dictionary/empathy">Merriam-Webster</a> defines it as &#8220;<strong>the action of understanding, being aware of,</strong> being sensitive to, and vicariously experiencing the feelings, <strong>thoughts, and experience of another</strong>.&#8221; [emphasis mine]</p><p>Bashing users is something most of us in the tech community are guilty of, myself included. But for the most part, I lean into empathy. It&#8217;s my superpower for writing. I think of different communities of people and what assumptions I can and can&#8217;t reasonably make about their capabilities, their knowledge, their environments, and their personalities. Then I write things to try to help those communities increase their understanding and make their lives a little bit easier.</p><p>We&#8217;re all living in such crazy times, full of misinformation and disinformation, and full of anger at each other. We should be strengthening our empathy skills and using them to help each other. Whether that means educating others on how to use AI, creating chatbot prompt templates, improving the quality of AI tools, or just spreading the message that there&#8217;s a great deal of AI hype afoot and that people still matter&#8212;we should all be doing our part. And there&#8217;s no better time to start than right now.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.tcannex.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Trusted Cyber Annex is a reader-supported publication. To receive new posts and support our work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Trusted Cyber Annex subscriptions for you to give away]]></title><description><![CDATA[Thank you for being a member of our Trusted Cyber Annex community.]]></description><link>https://www.tcannex.com/p/trusted-cyber-annex-subscriptions</link><guid isPermaLink="false">https://www.tcannex.com/p/trusted-cyber-annex-subscriptions</guid><dc:creator><![CDATA[Karen (Scarfone) Kent]]></dc:creator><pubDate>Mon, 21 Jul 2025 19:40:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DrR2!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573128ad-dbac-4d9f-a2c9-9cf2ad231174_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Thank you for being a member of our Trusted Cyber Annex community. As a paying subscriber, you&#8217;ve helped us get Trusted Cyber Annex off to a great start!</p><p>As a thank-you, we&#8217;d like to offer you free one-month gift subscriptions (usual value = $5 each) to give to your friends and colleagues. Know someone who might love Trusted Cyber Annex? Send their email&#8230;</p>
      <p>
          <a href="https://www.tcannex.com/p/trusted-cyber-annex-subscriptions">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>