Creating a Virtual SOC
This is an analysis of the Logrhythm(R) SIEM Product, its implementation, and potential cost savings focused on a DOD IT...
This is an analysis of the Logrhythm(R) SIEM Product, its implementation, and potential cost savings focused on a DOD IT...
How the National Security Agency (NSA) "Pwned" Cisco VPNs for 11 Years In the article, NSA Pwned Cisco VPNs for...
The Four Key Components Best Practice has been a long held position by many communities to include program management and...
The Joint Strike Fighter's (JSF) Autonomic Logistics Information System (ALIS) "Most-Public-Secret" The article, DOD Struggles with Risk Management Framework Adoption, https://defensesystems.com/articles/2018/11/30/dod-risk-management-framework.aspx is...
This is an update to my original June 22, 2017 article regarding the state of polygraphs. Even with current changes...
The must read books for 2018 These are the BEST books for the 2018 Cybersecurity Professional. These are the Top...
The challenges of getting more women into STEM and cybersecurity If you haven’t heard, there was a big upset at...
The final installment on cyberlaw, issues, challenges, and headaches.... https://cybersentinel.tech/2018/11/10/series-virtual-evidence-challenges-in-cyberlaw/ MORE & MORE CHALLENGES The other tests facing the value...
These myths are holding us back. We need to think more critically of the implications and impacts Myth 1: "Information...
What if the Risk Management Framework (RMF) applied to both the public and private sector ? SUMMARY This policy proposal...
A Review of Cybersecurity Shortsightedness I really enjoy attending the Washington DC's Chapter of the National Contract Management Association's (NMCA)...
PART 2: What we ALL need to know Covered in This Article: Fourth AmendmentFifth AmendmentElectronic Communications Privacy Act (ECPA)Communications Assistance...
Considered one of the most insightful leaders in Predictive Analytics (PA) Silver, N. (2012). The signal and the noise: Why...
PART 1: The Benefits & Dangers to Law Enforcement (LE) BACKGROUND The Washington Post Magazine (Sellers, 2015) described a fictional...
The Good, Bad & Ugly The hype on artificial intelligence (AI) is in two camps: it's the best thing ever...
How can Predictive Analytics (PA) move forward to improve our ability to better anticipate problems and threats? The use of...
Some Suggestions for the Department of Defense A Hybrid-Risk Management Framework (RMF) Step 3 A challenge facing the Department of...
Cyber Surveillance, its implications, and China's embrace Are you aware of the potential for many of these new technologies? I...
A Disruptive Technology Solution for the 21st Century: "Voice of America 2.0" Is this the same attitude that blindsided us...
While not greatly different, there are some unique variations The history of Risk Management (RM) can be traced to the...
The mainstream analysis is seriously flawed A shortage of nearly three million: This number may seem abstract,but it’s having a...
A review of academic work addressing how to improve cybersecurity Larrimore, N. P. (2018). Risk management strategies to prevent and...
We consider the following mini-framework This is a discussion on an emerging cybersecurity tactical approach to inject an even lower...
EDITOR: We received this from the original complainant who died several months ago and am sharing this as a public...
What does this mean for federal contractors? The September 2018 "National Cyber Strategy" was released by President Trump with barely...
A Case Analysis SUPREME COURT OF THE UNITED STATES City of Ontario, California, Et. Al. v. QUON Et Al. Certiorari...
Excellent article just appeared (Oct 4, 2018) in Bloomberg Businessweek: https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies A must-read of the Chinese infiltration into the US...
It's All About the Insider Threat Personnel Security controls may seem cumbersome and involved, especially when talking about unclassified systems....
The Differences between the "Deep" and "Dark" Web Some people have heard of the Dark Web, many others have not....
Wilson, J. (2015). China's Position on the Sony Attack: Implications for the US Response. Washington, DC: US-China Economic and Security...