GUIDE: The Threat Hunt Response Engagement & Action Team (THREAT)
The “Optimal” THREAT Task Organization The most common question at this point of anyone looking at the Threat Hunt concept...
The “Optimal” THREAT Task Organization The most common question at this point of anyone looking at the Threat Hunt concept...
It's time we measure how well we are really doing with Cybersecurity using Data Science "Cyber-Analytics: The application of data...
Getting System Developers to get Cyber Right Early...we hope A challenge facing the Department of Defense (DOD) is the allocation...
A Cybersecurity "Strawman" Offering Supply chain risks include the insertion of counterfeits, unauthorized production, tampering, theft, insertion of malicious software...
Huawei...Again.... The history of Cybersecurity-Supply Chain Risk Management (Cy-SCRM) can be traced to the year 2012. Shortly after the Chinese...
Q: When is self-defense defensive? A: Never Whether in the physical/kinetic or virtual/cyber world self-defense is never truly defensive. There...
Should the US ever self-attribute publicly? Does the nature of cyberspace make a difference in whether an activity is characterized...
A VERY Quick Analysis of Judge Frank Easterbrook, US Court of Appeals, 7th District's Opinion on Internet IP Information on...
For the budding Data Scientist, Engineer or Manager The following is part of a series on academic resources of interest...
A: More than 50% There are many historical examples how we as humans have missed the mark. It was not...
Take Control before you are taken control of.... The lead auditor will establish evaluation criteria for the assessment of the...
Elements of Good Audit Practices There are several activities that will help the security auditor prepare for a formal assessment. ...
What is NIST SP 800-171? In 2014, DOD adopted the overall National Institute of Standards and Technology (NIST )Risk Management...
A Quick-Start Guide Use the Cyber Incident Life Cycle to guide the company’s operational incident-handling artifact/procedure. This should be an...
2 WEEKS LEFT The F-35 joint program office issued a one-year Authority to Operate (ATO) in March 5, 2018 for...
The PPT "Triangle" is at the root of this issue Origins The People-Process-Technology (PPT) Triangle has a less than defined...
Lessons Learned about ongoing hacking challenges in the real estate market I recently moved across the country. Being a good...
...and 6 months (or less) contracts to boot Is anyone else tired of getting these positions? I keep getting them,...
Was it really worth it? The Intelligence Community (IC) recently released its Cyber Threat Framework (CTF). They have been working...
With all the new network breaches to both the public and private sector, who is the NUMBER 1 culprit? For...
How the Chinese are beating us in the long game The games we play as children tell us many things....
Because we are not really trying So why is secure system development so hard? Too many of the major defense...
Thanks all of you that have found and continue to visit the Cybersentinel Web Page We are happy to have...
So why should we move on and away from ISO 27001? The international standards community has done great work in...
Even cybersecurity professionals struggle everyday with the lack of support and derision of the profession Recently, an article was released...
John Chambers, former CEO, lays the foundation of Cisco's long-term success and profitability For any one who works actively within...
No. 93-8661 UNITED STATES COURT OF APPEALS FOR THE FOURTH DISTRICT 36 F.3d 457; 1994 U.S. App. LEXIS 30323 October...
What are the Steps to an effective "Hunt Process" at the grassroots level? A “Hunt Mission Program” is centered around...
The System Security Plan (SSP) contains three major architectural artifacts...is it time for a fourth? The SSP and its three...
This is an analysis of the Logrhythm(R) SIEM Product, its implementation, and potential cost savings focused on a DOD IT...