Creating a Virtual SOC
This is an analysis of the Logrhythm(R) SIEM Product, its implementation, and potential cost savings focused on a DOD IT...
This is an analysis of the Logrhythm(R) SIEM Product, its implementation, and potential cost savings focused on a DOD IT...
How the National Security Agency (NSA) "Pwned" Cisco VPNs for 11 Years In the article, NSA Pwned Cisco VPNs for...
The Four Key Components Best Practice has been a long held position by many communities to include program management and...
The Joint Strike Fighter's (JSF) Autonomic Logistics Information System (ALIS) "Most-Public-Secret" The article, DOD Struggles with Risk Management Framework Adoption, https://defensesystems.com/articles/2018/11/30/dod-risk-management-framework.aspx is...
This is an update to my original June 22, 2017 article regarding the state of polygraphs. Even with current changes...
The must read books for 2018 These are the BEST books for the 2018 Cybersecurity Professional. These are the Top...
The challenges of getting more women into STEM and cybersecurity If you haven’t heard, there was a big upset at...
The final installment on cyberlaw, issues, challenges, and headaches.... https://cybersentinel.tech/2018/11/10/series-virtual-evidence-challenges-in-cyberlaw/ MORE & MORE CHALLENGES The other tests facing the value...
These myths are holding us back. We need to think more critically of the implications and impacts Myth 1: "Information...