{"version":"https://jsonfeed.org/version/1","title":"Manuel W Lloyd Innovations","home_page_url":"https://manuelwlloyd.com","description":"Manuel W Lloyd Innovations","author":{"name":"Manuel W Lloyd Innovations"},"items":[{"id":"https://manuelwlloyd.com/blog/f/comparing-threat-intelligence-sharing-platforms","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/Qpkb0Y1\"/><p>Why Comparing Threat Intelligence Platforms Is the Wrong Problem (and What to Do Instead)</p>","url":"https://manuelwlloyd.com/blog/f/comparing-threat-intelligence-sharing-platforms","title":"Comparing Threat Intelligence Sharing Platforms","summary":"Why Comparing Threat Intelligence Platforms Is the Wrong Problem (and What to Do Instead)","date_modified":"2026-05-14T14:46:33Z"},{"id":"https://manuelwlloyd.com/blog/f/internet-as-deception-terrain","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/64005c23-080f-41ed-b960-b06948540a51/AAA14E25-82E3-4235-8A7C-363D9237AA9A.png\"/><p>For decades, organizations have treated the internet as an operational network.</p>","url":"https://manuelwlloyd.com/blog/f/internet-as-deception-terrain","title":"INTERNET AS DECEPTION TERRAIN","summary":"For decades, organizations have treated the internet as an operational network.","date_modified":"2026-05-07T14:29:10Z"},{"id":"https://manuelwlloyd.com/blog/f/big-bully-vs-big-brother","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/64005c23-080f-41ed-b960-b06948540a51/752CE2BE-DDC0-4C41-9CA1-0BA6CEF1C306.png\"/><p>There is growing concern around surveillance in cybersecurity.</p>","url":"https://manuelwlloyd.com/blog/f/big-bully-vs-big-brother","title":"BIG BULLY VS BIG BROTHER","summary":"There is growing concern around surveillance in cybersecurity.","date_modified":"2026-05-07T14:25:32Z"},{"id":"https://manuelwlloyd.com/blog/f/why-cybersecurity-still-fails","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/Nr5Nm4W\"/><p>Organizations continue to invest in:</p>","url":"https://manuelwlloyd.com/blog/f/why-cybersecurity-still-fails","title":"WHY CYBERSECURITY STILL FAILS","summary":"Organizations continue to invest in:","date_modified":"2026-05-07T14:19:34Z"},{"id":"https://manuelwlloyd.com/blog/f/cyber-decision-making-under-stress","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/8766\"/><p>Cyber incidents are not just technical events.</p>","url":"https://manuelwlloyd.com/blog/f/cyber-decision-making-under-stress","title":"CYBER DECISION MAKING UNDER STRESS","summary":"Cyber incidents are not just technical events.","date_modified":"2026-05-07T14:16:26Z"},{"id":"https://manuelwlloyd.com/blog/f/the-illusion-of-control-in-cybersecurity","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/373\"/><p>Cybersecurity produces:</p>","url":"https://manuelwlloyd.com/blog/f/the-illusion-of-control-in-cybersecurity","title":"THE ILLUSION OF CONTROL IN CYBERSECURITY","summary":"Cybersecurity produces:","date_modified":"2026-05-07T14:12:14Z"},{"id":"https://manuelwlloyd.com/blog/f/cyber-resilience-validation","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/6218\"/><p>Most cybersecurity assessments evaluate systems.</p>","url":"https://manuelwlloyd.com/blog/f/cyber-resilience-validation","title":"CYBER RESILIENCE VALIDATION","summary":"Most cybersecurity assessments evaluate systems.","date_modified":"2026-05-07T13:24:50Z"},{"id":"https://manuelwlloyd.com/blog/f/measured-vs-broken","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/jaWbKYP\"/><p>Cybersecurity measures what is visible.</p>","url":"https://manuelwlloyd.com/blog/f/measured-vs-broken","title":"MEASURED VS BROKEN","summary":"Cybersecurity measures what is visible.","date_modified":"2026-05-07T13:20:46Z"},{"id":"https://manuelwlloyd.com/blog/f/authority-continuity","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/6239\"/><p>Cyber resilience is often defined as:</p>","url":"https://manuelwlloyd.com/blog/f/authority-continuity","title":"AUTHORITY CONTINUITY","summary":"Cyber resilience is often defined as:","date_modified":"2026-05-07T13:15:44Z"},{"id":"https://manuelwlloyd.com/blog/f/not-a-framework-not-a-product","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/Y8dd3D9\"/><p>Not a Framework. Not a Product. Not a Compliance Model.</p>","url":"https://manuelwlloyd.com/blog/f/not-a-framework-not-a-product","title":"NOT A FRAMEWORK, NOT A PRODUCT","summary":"Not a Framework. Not a Product. Not a Compliance Model.","date_modified":"2026-05-07T13:12:17Z"},{"id":"https://manuelwlloyd.com/blog/f/policy-vs-operators","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/xxk54z8\"/><p>Policy vs Operators: Same Gap, Different Systems</p>","url":"https://manuelwlloyd.com/blog/f/policy-vs-operators","title":"POLICY VS OPERATORS","summary":"Policy vs Operators: Same Gap, Different Systems","date_modified":"2026-05-07T13:07:03Z"},{"id":"https://manuelwlloyd.com/blog/f/non%E2%80%91operational-artifacts","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/lbrjjWg\"/><p>NON‑OPERATIONAL ARTIFACTS</p>","url":"https://manuelwlloyd.com/blog/f/non%E2%80%91operational-artifacts","title":"NON‑OPERATIONAL ARTIFACTS","summary":"NON‑OPERATIONAL ARTIFACTS","date_modified":"2026-05-07T13:03:32Z"},{"id":"https://manuelwlloyd.com/blog/f/when-authority-survives","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/o3zNRRr\"/><p>Most organizations assume authority will hold.</p>","url":"https://manuelwlloyd.com/blog/f/when-authority-survives","title":"WHEN AUTHORITY SURVIVES","summary":"Most organizations assume authority will hold.","date_modified":"2026-05-07T12:56:09Z"},{"id":"https://manuelwlloyd.com/blog/f/post%E2%80%91compromise-cyber-authority","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/7z3Km04\"/><p>Cybersecurity programs are designed to prevent compromise.</p>","url":"https://manuelwlloyd.com/blog/f/post%E2%80%91compromise-cyber-authority","title":"POST‑COMPROMISE CYBER AUTHORITY","summary":"Cybersecurity programs are designed to prevent compromise.","date_modified":"2026-05-07T12:49:53Z"},{"id":"https://manuelwlloyd.com/blog/f/what-is-cyber-resilience-authority-governance","html_content":"<img src=\"https://img1.wsimg.com/isteam/stock/817\"/><p>Cyber resilience is typically measured through controls, monitoring, and response capability.</p>","url":"https://manuelwlloyd.com/blog/f/what-is-cyber-resilience-authority-governance","title":"WHAT IS CYBER RESILIENCE & AUTHORITY GOVERNANCE?","summary":"Cyber resilience is typically measured through controls, monitoring, and response capability.","date_modified":"2026-05-07T12:37:29Z"}]}