CYBER DECEPTION: Impact to Cybersecurity and the Application of Machine Learning Tools
Cyber deception is a relatively new approach to cybersecurity that involves creating fake digital assets, such as fake websites or...
Cyber deception is a relatively new approach to cybersecurity that involves creating fake digital assets, such as fake websites or...
Threat Intelligence and Situational Awareness Beyond the Security Boundary Columbus (2019a) identifies ten major cybersecurity firms that are applying AI-based...
Why mathematics and the CMMC don't seem to work.... Security controls MUST be either established, addressed in a cybersecurity policy...
Meet Stoll & Olson Phone Bill Problem Even before the vast proliferation of the personal computer, it took a 75-cent...
Getting Right or Wrong? Commercial Developments A review of open-source industrial sector literature reveals a predominant use of internal data...
We still do not have a good universal understanding of the role of leadership and the basics of RMF to...
A Matter of Whether You Want to Go to the Dance The use of a theoretical framework is most associated...
An Evolution for Cyber Threat Intelligence Classic Indicators of Compromise (C-IOC) are based upon heuristic, static, “rules of thumb.” If...
"So, we are not quite Amazon, but we are excited to hit the 5K mark" Woo Hoo! We also have...
Some modern approaches to operational and support cyber constructs Alvarenga, A., & Tanev, G. (2017). A cybersecurity risk assessment framework...
Getting System Developers to get Cyber Right Early...we hope A challenge facing the Department of Defense (DOD) is the allocation...
Should the US ever self-attribute publicly? Does the nature of cyberspace make a difference in whether an activity is characterized...
A VERY Quick Analysis of Judge Frank Easterbrook, US Court of Appeals, 7th District's Opinion on Internet IP Information on...
2 WEEKS LEFT The F-35 joint program office issued a one-year Authority to Operate (ATO) in March 5, 2018 for...
Because we are not really trying So why is secure system development so hard? Too many of the major defense...
So why should we move on and away from ISO 27001? The international standards community has done great work in...
What are the Steps to an effective "Hunt Process" at the grassroots level? A “Hunt Mission Program” is centered around...
The Joint Strike Fighter's (JSF) Autonomic Logistics Information System (ALIS) "Most-Public-Secret" The article, DOD Struggles with Risk Management Framework Adoption, https://defensesystems.com/articles/2018/11/30/dod-risk-management-framework.aspx is...
The must read books for 2018 These are the BEST books for the 2018 Cybersecurity Professional. These are the Top...
What if the Risk Management Framework (RMF) applied to both the public and private sector ? SUMMARY This policy proposal...
A Disruptive Technology Solution for the 21st Century: "Voice of America 2.0" Is this the same attitude that blindsided us...
A review of academic work addressing how to improve cybersecurity Larrimore, N. P. (2018). Risk management strategies to prevent and...
A Case Analysis SUPREME COURT OF THE UNITED STATES City of Ontario, California, Et. Al. v. QUON Et Al. Certiorari...
Wilson, J. (2015). China's Position on the Sony Attack: Implications for the US Response. Washington, DC: US-China Economic and Security...
111F Supp 2d 294(U.S. Dist. Ct., So Dist. NY, 2000) Historical and legal considerations that play a role in policy...
Emerging Technology Bandwidth demands are growing exponentially. “Leading service providers report bandwidth doubling on their backbones every six to nine...
NIST Frameworks that Fit In the age of lean and agile development, can “Agile Cybersecurity” fit into these paradigms? Is...