CYBERLAW: May 8, 2019 — A Hallmark Day in Cybersecurity
The Recent False Claims Act (FCA) Decision Markus v. Aerojet Rocketdyne Holdings Inc. May 8, 2019 THE day that changed...
The Recent False Claims Act (FCA) Decision Markus v. Aerojet Rocketdyne Holdings Inc. May 8, 2019 THE day that changed...
There is a Difference... POLICY: Broad and informative high-level description of principles focused on a particular topic area. For example,...
How to Demonstrate a Strong Security Posture A continuing focus on the third-leg of of the cyber-Body of Evidence (BOE),...
Standard Categories for Your Cyber Policy Artifact (I have been getting a lot of requests for help in this area...I...
The “Optimal” THREAT Task Organization The most common question at this point of anyone looking at the Threat Hunt concept...
It's time we measure how well we are really doing with Cybersecurity using Data Science "Cyber-Analytics: The application of data...
A Cybersecurity "Strawman" Offering Supply chain risks include the insertion of counterfeits, unauthorized production, tampering, theft, insertion of malicious software...
Q: When is self-defense defensive? A: Never Whether in the physical/kinetic or virtual/cyber world self-defense is never truly defensive. There...
For the budding Data Scientist, Engineer or Manager The following is part of a series on academic resources of interest...
A: More than 50% There are many historical examples how we as humans have missed the mark. It was not...
Elements of Good Audit Practices There are several activities that will help the security auditor prepare for a formal assessment. ...
The PPT "Triangle" is at the root of this issue Origins The People-Process-Technology (PPT) Triangle has a less than defined...
...and 6 months (or less) contracts to boot Is anyone else tired of getting these positions? I keep getting them,...
How the Chinese are beating us in the long game The games we play as children tell us many things....
John Chambers, former CEO, lays the foundation of Cisco's long-term success and profitability For any one who works actively within...
No. 93-8661 UNITED STATES COURT OF APPEALS FOR THE FOURTH DISTRICT 36 F.3d 457; 1994 U.S. App. LEXIS 30323 October...
The System Security Plan (SSP) contains three major architectural artifacts...is it time for a fourth? The SSP and its three...
This is an analysis of the Logrhythm(R) SIEM Product, its implementation, and potential cost savings focused on a DOD IT...
The Four Key Components Best Practice has been a long held position by many communities to include program management and...
This is an update to my original June 22, 2017 article regarding the state of polygraphs. Even with current changes...
These myths are holding us back. We need to think more critically of the implications and impacts Myth 1: "Information...
A Review of Cybersecurity Shortsightedness I really enjoy attending the Washington DC's Chapter of the National Contract Management Association's (NMCA)...
Considered one of the most insightful leaders in Predictive Analytics (PA) Silver, N. (2012). The signal and the noise: Why...
How can Predictive Analytics (PA) move forward to improve our ability to better anticipate problems and threats? The use of...
Some Suggestions for the Department of Defense A Hybrid-Risk Management Framework (RMF) Step 3 A challenge facing the Department of...
While not greatly different, there are some unique variations The history of Risk Management (RM) can be traced to the...
The mainstream analysis is seriously flawed A shortage of nearly three million: This number may seem abstract,but it’s having a...
We consider the following mini-framework This is a discussion on an emerging cybersecurity tactical approach to inject an even lower...
What does this mean for federal contractors? The September 2018 "National Cyber Strategy" was released by President Trump with barely...
Excellent article just appeared (Oct 4, 2018) in Bloomberg Businessweek: https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies A must-read of the Chinese infiltration into the US...