SPOT: “Congress at Rest”
The Do-Nothing Congress of 2019 A contributory factor to the overall problem in the nation's cybersecurity posture is the lack...
The Do-Nothing Congress of 2019 A contributory factor to the overall problem in the nation's cybersecurity posture is the lack...
Getting Right or Wrong? Commercial Developments A review of open-source industrial sector literature reveals a predominant use of internal data...
What's making the current Artificial Intelligence (AI) "Summer" Possible? Rodriguez and Da Cunha (2018) describe an interrelationship between the elements...
A perspective on where the cybersecurity challenge started The world is run by ones and zeroes…There’s a war out there…It’s...
The ONLY change needed is the introduction of third-party assessors to resolve the one real flaw of RMF "The current...
Discussion-Thought Piece on the Future of Data Science Solutions in the Cybersecurity Battle Frontlines The world is run by ones...
The Internet of Things (IoT) is the most pervasive and wide-spread expression of the Information Age since the introduction of...
We still do not have a good universal understanding of the role of leadership and the basics of RMF to...
Security Information Event Managers (SIEM) and like Data Science-based automated solutions continue to fail against a broad and complex array...
--Technology and Privacy-- Written by Dr. Susan Cole and Dr. Dana Hudnall In an era where privacy is not valued...
The Problems in Both Qualitative and Quantitative Research The Real Data Science Challenges: Data Collection and Analysis Data collection in...
What are we still missing ? Background Ezeife, Dong, and Aggarwal (2008) describe the frustrations of intrusion detection of cyber-threats...
Quality is not just a matter of performance Supply chain quality management efforts now require supply chain security management focus...
Why is the Problem Statement so Important? A practical problem statement should raise “the questions asked and the reasons for...
A Matter of Whether You Want to Go to the Dance The use of a theoretical framework is most associated...
The Threat Hunt Team and Cyber Threat Intelligence (CTI) Connection The Master Threat Hunting Database (MTHDB). The MTHDB is a...
An Evolution for Cyber Threat Intelligence Classic Indicators of Compromise (C-IOC) are based upon heuristic, static, “rules of thumb.” If...
Quantitative and Qualitative Research Designs can no longer stand on their own Abstract The author conducts a literature review on...
How to approach a Threat Hunt using the Army Decision-Making Process Mission Planning is the foundational aspect of any Threat...
Characteristics of a Successful Hunt Mission To ensure that the hunt team’s analysts remain focused on relevant and important hunts,...
What do we do when our failed efforts have been focused on prevention? DEFINITION: CYBER-DECEPTION: Deliberate actions to obfuscate the...
How to order your references for correctness This is a continuation of blog posts to help those developing, writing, and...
The Recent False Claims Act (FCA) Decision Markus v. Aerojet Rocketdyne Holdings Inc. May 8, 2019 THE day that changed...
"So, we are not quite Amazon, but we are excited to hit the 5K mark" Woo Hoo! We also have...
There is a Difference... POLICY: Broad and informative high-level description of principles focused on a particular topic area. For example,...
How to Demonstrate a Strong Security Posture A continuing focus on the third-leg of of the cyber-Body of Evidence (BOE),...
Standard Categories for Your Cyber Policy Artifact (I have been getting a lot of requests for help in this area...I...
Some modern approaches to operational and support cyber constructs Alvarenga, A., & Tanev, G. (2017). A cybersecurity risk assessment framework...
So, your contractor says they are "experts" in cybersecurity...are you sure? THE REAL PROBLEM: Program Managers, Contract Officer Representatives, etc.,...
Where do we draw the line between privacy and security? This is becoming more and more relevant with advances in...