Cyber Threat Hunting (CTH) in an Age of Escalating Cyber Threats
Why Cyber Threat Hunting? As the digital world evolves and grows, so do the complexities and challenges of cybersecurity. Cyber...
Why Cyber Threat Hunting? As the digital world evolves and grows, so do the complexities and challenges of cybersecurity. Cyber...
Where has measurability gone? Approximately “48% attempt to quantify the damage a cyberattack could have” on their business (Lis &...
Getting Right or Wrong? Commercial Developments A review of open-source industrial sector literature reveals a predominant use of internal data...
--Technology and Privacy-- Written by Dr. Susan Cole and Dr. Dana Hudnall In an era where privacy is not valued...
Take Control before you are taken control of.... The lead auditor will establish evaluation criteria for the assessment of the...
HIRE A vCISO at Cybersentinel.ai CLICK THE LINK ABOVE As a business owner, you have a lot on your plate...
SUSCEPTIBILITY OF DATA INTERNAL AND EXTERNAL TO THE DATA ANALYTIC EFFORT...INSIDE AND OUTSIDE "THE WIRE" Data poisoning, also known as...
Cyber deception is a relatively new approach to cybersecurity that involves creating fake digital assets, such as fake websites or...
The National Institute of Standards and Technology (NIST) Special Publication 800-171, "Protecting Controlled Unclassified Information in Nonfederal Information Systems and...
CYBERSECURITY REQUIRES A HOLISTIC APPROACH AT ALL LEVELS The Department of Defense (DoD) is critical in protecting the United States...
LEARNING SHOULD NEVER END Continual learning is a crucial aspect of personal and professional development, and it is important...
Garbage in/Garbage out...why do we need good data? Data quality and consistency are crucial for data scientists because they significantly...
MORE THAN JUST NIST SECURITY CONTROLS System hardening is the process of securing a computer system by reducing its attack...
Cyberanalytics is the logical progression for the application of Machine Learning to Cybersecurity Protective Measures As we continue to rely...
A CYBER-SHORT FOR BUSINESSES: NOT QUITE THE ALAMO, BUT GETTING MORE CHALLENGING Cybersecurity is an increasingly important concern for businesses...
DEFENDING AGAINST ONGOING CYBER-ASSAULTS As a company or business, it is essential to prioritize the protection of your computer infrastructure...
Clustering algorithms are a type of machine learning algorithm that can be used to identify patterns and relationships within a...
Metrics are a crucial aspect of cybersecurity, as they allow organizations to measure and track the effectiveness of their security...
Applying the Qualitative to Frame Quantitative Analysis Abstract A significant challenge facing businesses and agencies is how to focus limited...
Is more data better or worse? Abstract One quantitative challenge facing experimenters in data science is how large a sample...
Balancing the Benefits of Data Science with Privacy The implications of data science have yet to solidify within the academic...
An Ethical Exploration ...A Faulty Application of Utilitarianism in Cybersecurity.... Utilitarianism is foundational to the Western business ethical decision-making process...
Focus on what will make it work #6 It is more TACTICAL than STRATEGIC. The current small community addressing why...
For those delving into a Phd Program I have had some questions from readers starting their own PhD adventure. The...
On January 31, 2020 several issues answered by the DOD specific to the CMMC. In 2019, the Department of Defense...
Wilner (2018) describes the nature of cybersecurity as unsurprisingly fluctuating due to ongoing threat challenges, especially in the area of...
A Prognostication for the Arm-chair Cyber Generals In 2019, the Department of Defense (DOD) announced the development of the Cybersecurity...
Threat Intelligence and Situational Awareness Beyond the Security Boundary Columbus (2019a) identifies ten major cybersecurity firms that are applying AI-based...
Why mathematics and the CMMC don't seem to work.... Security controls MUST be either established, addressed in a cybersecurity policy...
Meet Stoll & Olson Phone Bill Problem Even before the vast proliferation of the personal computer, it took a 75-cent...
The Value of Data Science in the 21st Century Halladay (2013) explores the value of AI/ML predictive capabilities in the...
In the Background way too Long... Nagrecha and Chawla’s (2106) and Zuech et al.’s (2015) works are historical and seminal...
In the beginning. While it is presumed that the advent of data science and AI is a rather new phenomenon,...