Cyber Threat Hunting (CTH) in an Age of Escalating Cyber Threats
Why Cyber Threat Hunting? As the digital world evolves and grows, so do the complexities and challenges of cybersecurity. Cyber...
Why Cyber Threat Hunting? As the digital world evolves and grows, so do the complexities and challenges of cybersecurity. Cyber...
SUSCEPTIBILITY OF DATA INTERNAL AND EXTERNAL TO THE DATA ANALYTIC EFFORT...INSIDE AND OUTSIDE "THE WIRE" Data poisoning, also known as...
CYBERSECURITY REQUIRES A HOLISTIC APPROACH AT ALL LEVELS The Department of Defense (DoD) is critical in protecting the United States...
Garbage in/Garbage out...why do we need good data? Data quality and consistency are crucial for data scientists because they significantly...
MORE THAN JUST NIST SECURITY CONTROLS System hardening is the process of securing a computer system by reducing its attack...
Cyberanalytics is the logical progression for the application of Machine Learning to Cybersecurity Protective Measures As we continue to rely...
DEFENDING AGAINST ONGOING CYBER-ASSAULTS As a company or business, it is essential to prioritize the protection of your computer infrastructure...
Clustering algorithms are a type of machine learning algorithm that can be used to identify patterns and relationships within a...
Metrics are a crucial aspect of cybersecurity, as they allow organizations to measure and track the effectiveness of their security...
Applying the Qualitative to Frame Quantitative Analysis Abstract A significant challenge facing businesses and agencies is how to focus limited...
Is more data better or worse? Abstract One quantitative challenge facing experimenters in data science is how large a sample...
Balancing the Benefits of Data Science with Privacy The implications of data science have yet to solidify within the academic...
An Ethical Exploration ...A Faulty Application of Utilitarianism in Cybersecurity.... Utilitarianism is foundational to the Western business ethical decision-making process...
Focus on what will make it work #6 It is more TACTICAL than STRATEGIC. The current small community addressing why...
For those delving into a Phd Program I have had some questions from readers starting their own PhD adventure. The...
A Prognostication for the Arm-chair Cyber Generals In 2019, the Department of Defense (DOD) announced the development of the Cybersecurity...
Where has measurability gone? Approximately “48% attempt to quantify the damage a cyberattack could have” on their business (Lis &...
In the Background way too Long... Nagrecha and Chawla’s (2106) and Zuech et al.’s (2015) works are historical and seminal...
In the beginning. While it is presumed that the advent of data science and AI is a rather new phenomenon,...
What's making the current Artificial Intelligence (AI) "Summer" Possible? Rodriguez and Da Cunha (2018) describe an interrelationship between the elements...
A perspective on where the cybersecurity challenge started The world is run by ones and zeroes…There’s a war out there…It’s...
The ONLY change needed is the introduction of third-party assessors to resolve the one real flaw of RMF "The current...
Discussion-Thought Piece on the Future of Data Science Solutions in the Cybersecurity Battle Frontlines The world is run by ones...
Security Information Event Managers (SIEM) and like Data Science-based automated solutions continue to fail against a broad and complex array...
The Problems in Both Qualitative and Quantitative Research The Real Data Science Challenges: Data Collection and Analysis Data collection in...
What are we still missing ? Background Ezeife, Dong, and Aggarwal (2008) describe the frustrations of intrusion detection of cyber-threats...
Quality is not just a matter of performance Supply chain quality management efforts now require supply chain security management focus...
Quantitative and Qualitative Research Designs can no longer stand on their own Abstract The author conducts a literature review on...
Characteristics of a Successful Hunt Mission To ensure that the hunt team’s analysts remain focused on relevant and important hunts,...
What do we do when our failed efforts have been focused on prevention? DEFINITION: CYBER-DECEPTION: Deliberate actions to obfuscate the...