Cyber Threat Hunting (CTH) in an Age of Escalating Cyber Threats
Why Cyber Threat Hunting? As the digital world evolves and grows, so do the complexities and challenges of cybersecurity. Cyber...
Why Cyber Threat Hunting? As the digital world evolves and grows, so do the complexities and challenges of cybersecurity. Cyber...
MORE THAN JUST NIST SECURITY CONTROLS System hardening is the process of securing a computer system by reducing its attack...
Metrics are a crucial aspect of cybersecurity, as they allow organizations to measure and track the effectiveness of their security...
Applying the Qualitative to Frame Quantitative Analysis Abstract A significant challenge facing businesses and agencies is how to focus limited...
Balancing the Benefits of Data Science with Privacy The implications of data science have yet to solidify within the academic...
Wilner (2018) describes the nature of cybersecurity as unsurprisingly fluctuating due to ongoing threat challenges, especially in the area of...
Threat Intelligence and Situational Awareness Beyond the Security Boundary Columbus (2019a) identifies ten major cybersecurity firms that are applying AI-based...
Meet Stoll & Olson Phone Bill Problem Even before the vast proliferation of the personal computer, it took a 75-cent...
The Value of Data Science in the 21st Century Halladay (2013) explores the value of AI/ML predictive capabilities in the...
Getting Right or Wrong? Commercial Developments A review of open-source industrial sector literature reveals a predominant use of internal data...
A perspective on where the cybersecurity challenge started The world is run by ones and zeroes…There’s a war out there…It’s...
The Problems in Both Qualitative and Quantitative Research The Real Data Science Challenges: Data Collection and Analysis Data collection in...
Why is the Problem Statement so Important? A practical problem statement should raise “the questions asked and the reasons for...
A Matter of Whether You Want to Go to the Dance The use of a theoretical framework is most associated...
The Threat Hunt Team and Cyber Threat Intelligence (CTI) Connection The Master Threat Hunting Database (MTHDB). The MTHDB is a...
An Evolution for Cyber Threat Intelligence Classic Indicators of Compromise (C-IOC) are based upon heuristic, static, “rules of thumb.” If...
Characteristics of a Successful Hunt Mission To ensure that the hunt team’s analysts remain focused on relevant and important hunts,...
What do we do when our failed efforts have been focused on prevention? DEFINITION: CYBER-DECEPTION: Deliberate actions to obfuscate the...
How to order your references for correctness This is a continuation of blog posts to help those developing, writing, and...
There is a Difference... POLICY: Broad and informative high-level description of principles focused on a particular topic area. For example,...
Standard Categories for Your Cyber Policy Artifact (I have been getting a lot of requests for help in this area...I...
It's time we measure how well we are really doing with Cybersecurity using Data Science "Cyber-Analytics: The application of data...
A Cybersecurity "Strawman" Offering Supply chain risks include the insertion of counterfeits, unauthorized production, tampering, theft, insertion of malicious software...
Q: When is self-defense defensive? A: Never Whether in the physical/kinetic or virtual/cyber world self-defense is never truly defensive. There...
A VERY Quick Analysis of Judge Frank Easterbrook, US Court of Appeals, 7th District's Opinion on Internet IP Information on...
Elements of Good Audit Practices There are several activities that will help the security auditor prepare for a formal assessment. ...
With all the new network breaches to both the public and private sector, who is the NUMBER 1 culprit? For...
So why should we move on and away from ISO 27001? The international standards community has done great work in...
John Chambers, former CEO, lays the foundation of Cisco's long-term success and profitability For any one who works actively within...
What are the Steps to an effective "Hunt Process" at the grassroots level? A “Hunt Mission Program” is centered around...