Resources

Publications, articles, methodologies, and interactive tools from RESCOR. Filter by type or topic below.

PublicationGovernanceMethodologySecurity

Guerilla Security: The Martial Art of Information Security

The practitioner's reference. 2026 Edition, Revision 1. 20 chapters covering security philosophy, the modern threat landscape, defensive controls, detection and response, and governance — including the Three Laws of Guerilla Security, the RAPID methodology, STORM quantitative risk measurement, optimal privilege, control friction, and AI governance. In continuous publication since 1994.

2026-01-15

PublicationGovernanceAwareness

Guerilla Security: What Everyone Needs to Know

A plain-language companion for board members, executives, employees, and customers. Covers the threats you'll actually face, what to do about passwords and MFA, how to protect sensitive information, and why your vigilance matters more than any technology.

2026-01-15

PublicationMethodologyGovernanceCompliance

RAPID Practice Guide

The public methodology guide for RAPID — Rapid Adaptation Process for IT Deployment. Covers the origin, the cycle, the characteristics of a RAPID-developed SGRC program, and how RAPID integrates with agile / DevSecOps and with common compliance frameworks. Version 11.0, March 2026.

2026-03-01

PublicationSTORMMethodology

STORM/RSK White Paper

The public foundations of STORM: measurement requirements, the qualitative-to-quantitative (L2N) transition, the diminishing-impact aggregation, the Transforms for asset/threat/vulnerability/control, ATRA, and framework mapping to NIST 800-30, OCTAVE, ISO 27005, FAIR, and COBIT. IEEE research-paper format.

2026-04-21

PublicationHIPAASTORMHealthcareMethodologyAI / ML

Sample HIPAA Risk Analysis

A sample risk analysis generated end-to-end by ATRA — the first production deliverable produced by the platform. Demonstrates STORM quantitative measurement applied to HIPAA Security Rule safeguards, with comparable, trendable numbers replacing qualitative labels.

2026-02-01

PublicationGLBASTORMFinancial

Sample GLBA Security Test Report

An anonymized security testing report for a small financial institution, demonstrating RESCOR's vulnerability assessment methodology with STORM quantitative severity measurement, prioritized recommendations with projected risk reduction, and multi-year trend analysis.

2026-02-10

MethodologySTORMMethodologyGovernance

STORM — Simplified Total Risk Management

The quantitative risk methodology at qualitative information cost. STORM Transforms, L2N transition, diminishing-impact aggregation, and framework mapping (NIST 800-30, OCTAVE, ISO 27005, FAIR, COBIT). Entry point to the whole STORM ecosystem.

MethodologySTORMAI / MLMethodology

ATRA — Advanced Total Risk Assessment

STORM with AI-assisted population of the Transform inputs. AI proposes candidate asset, threat, vulnerability, and control values; humans approve. Preserves STORM's auditability while collapsing the time cost of an assessment.

MethodologyMethodologyGovernanceSecurity

StrongCOR — Continuous Operational Resilience

RESCOR's framework for operational resilience, continuity, and incident-response readiness. Integrates with STORM risk measurement to prioritize resilience investments against measured risk.

MethodologyMethodologyGovernance

RAPID — Rapid Adaptation Process for IT Deployment

The iterative engagement methodology that turns STORM measurements into prioritized, budgeted, scheduled remediation. The bridge between risk assessment and measurable risk reduction; covers security governance, compliance, and operational rollout. In continuous use since 1992.

ArticleSecurityMethodology

A Primer on Incident Response

Detection, response, recovery, and analysis — the four phases of incident response we described in 2002 are still the foundation of every modern IR program.

2026-04-08

ArticleSecurityGovernance

Bad Customer Service Is a Strategic Risk

When security and compliance policies punish customers instead of protecting them, you've turned your controls into competitive liabilities. Three patterns to watch for: the wolverine, the capricious enforcer, and the rote enforcer.

2026-04-08

ArticleIAMLeast PrivilegeMethodology

Least Privilege Can Be Poor Practice

The principle of least privilege, as usually implemented, causes role explosion, audit failure, and productivity loss. The principle of optimal privilege produces better security outcomes.

2026-04-03

ArticleAI / MLGovernance

The Limits of Artificial Intelligence (AI)

The practical and theoretical limits of AI — computability, complexity, accountability, governance — and what they mean for your organization.

2026-03-29

ArticleSecurityMethodology

Why Complex Systems Fail

Interactive complexity and tight coupling in technology systems create failure modes no one can predict. Here's what to do about it.

2026-03-29

ToolSTORMMethodology

HAM533 Threat Calculator

Interactive threat assessment calculator using the HAM533 History-Access-Means model. Quantifies threat probability and impact from ordinary qualitative judgments.

ToolSTORMMethodology

CRVE Vulnerability Exposure Calculator

STORM Vulnerability Assessment transform for complex, non-CVSS vulnerabilities. Structured scoring over Capability, Resources, Visibility, and Effects on confidentiality, integrity, and availability.

ToolSTORMMethodology

SCEP Control Evaluation Calculator

STORM Control Evaluation transform. Takes an initial exposure and a set of mitigating controls, applies the STORM/RSK diminishing-impact aggregation, and produces a defensible residual exposure.

ToolSTORMMethodology

BCAV Asset Valuation Calculator

STORM Basic Criticality for Asset Valuation. Combines data classification, user-base scope, and high-value-data indicators across multiple assets into a defensible composite criticality.

ToolAwarenessTraining

Security Quiz

Short interactive quiz covering the practical security knowledge every employee should have: passwords, MFA, phishing, sensitive data handling, and incident reporting.

ToolIAMCloudLeast PrivilegeExternal

AccessGuard

Open-source AI-powered AWS/Azure/GCP IAM role engineering and RBAC optimization tool. Analyzes existing roles, proposes least-privilege consolidations, and tracks drift.

ToolMigrationEmailExternal

aw2ms365

Amazon WorkMail to Microsoft 365 mailbox migration assistant. Handles folder structure, retention, and rule translation.