CYBER DECEPTION: Impact to Cybersecurity and the Application of Machine Learning Tools
Cyber deception is a relatively new approach to cybersecurity that involves creating fake digital assets, such as fake websites or...
Cyber deception is a relatively new approach to cybersecurity that involves creating fake digital assets, such as fake websites or...
The National Institute of Standards and Technology (NIST) Special Publication 800-171, "Protecting Controlled Unclassified Information in Nonfederal Information Systems and...
Focus on what will make it work #6 It is more TACTICAL than STRATEGIC. The current small community addressing why...
Why mathematics and the CMMC don't seem to work.... Security controls MUST be either established, addressed in a cybersecurity policy...
The ONLY change needed is the introduction of third-party assessors to resolve the one real flaw of RMF "The current...
Security Information Event Managers (SIEM) and like Data Science-based automated solutions continue to fail against a broad and complex array...
--Technology and Privacy-- Written by Dr. Susan Cole and Dr. Dana Hudnall In an era where privacy is not valued...
Where do we draw the line between privacy and security? This is becoming more and more relevant with advances in...
Huawei...Again.... The history of Cybersecurity-Supply Chain Risk Management (Cy-SCRM) can be traced to the year 2012. Shortly after the Chinese...
A: More than 50% There are many historical examples how we as humans have missed the mark. It was not...
The PPT "Triangle" is at the root of this issue Origins The People-Process-Technology (PPT) Triangle has a less than defined...
Lessons Learned about ongoing hacking challenges in the real estate market I recently moved across the country. Being a good...
...and 6 months (or less) contracts to boot Is anyone else tired of getting these positions? I keep getting them,...
How the Chinese are beating us in the long game The games we play as children tell us many things....
Because we are not really trying So why is secure system development so hard? Too many of the major defense...
Even cybersecurity professionals struggle everyday with the lack of support and derision of the profession Recently, an article was released...
No. 93-8661 UNITED STATES COURT OF APPEALS FOR THE FOURTH DISTRICT 36 F.3d 457; 1994 U.S. App. LEXIS 30323 October...
How the National Security Agency (NSA) "Pwned" Cisco VPNs for 11 Years In the article, NSA Pwned Cisco VPNs for...
This is an update to my original June 22, 2017 article regarding the state of polygraphs. Even with current changes...
The challenges of getting more women into STEM and cybersecurity If you haven’t heard, there was a big upset at...
The final installment on cyberlaw, issues, challenges, and headaches.... https://cybersentinel.tech/2018/11/10/series-virtual-evidence-challenges-in-cyberlaw/ MORE & MORE CHALLENGES The other tests facing the value...
A Review of Cybersecurity Shortsightedness I really enjoy attending the Washington DC's Chapter of the National Contract Management Association's (NMCA)...
The Good, Bad & Ugly The hype on artificial intelligence (AI) is in two camps: it's the best thing ever...
Cyber Surveillance, its implications, and China's embrace Are you aware of the potential for many of these new technologies? I...
Excellent article just appeared (Oct 4, 2018) in Bloomberg Businessweek:Â Â https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies A must-read of the Chinese infiltration into the US...
The Differences between the "Deep" and "Dark" Web Some people have heard of the Dark Web, many others have not....
A Recent Cybersecurity Question Raised from within the F-35 Joint Strike Fighter Program Imagine your bank is audited every...
A Look at How China's Huawei Technologies Company is under the persistent observation of the United States Introduction In February...