EDITORIAL: Do We Need to Add a “Data Inventory” to the SSP?
The System Security Plan (SSP) contains three major architectural artifacts...is it time for a fourth? The SSP and its three...
The System Security Plan (SSP) contains three major architectural artifacts...is it time for a fourth? The SSP and its three...
The final installment on cyberlaw, issues, challenges, and headaches.... https://cybersentinel.tech/2018/11/10/series-virtual-evidence-challenges-in-cyberlaw/ MORE & MORE CHALLENGES The other tests facing the value...
What if the Risk Management Framework (RMF) applied to both the public and private sector ? SUMMARY This policy proposal...
A Review of Cybersecurity Shortsightedness I really enjoy attending the Washington DC's Chapter of the National Contract Management Association's (NMCA)...
PART 2: What we ALL need to know Covered in This Article: Fourth AmendmentFifth AmendmentElectronic Communications Privacy Act (ECPA)Communications Assistance...
Considered one of the most insightful leaders in Predictive Analytics (PA) Silver, N. (2012). The signal and the noise: Why...
PART 1: The Benefits & Dangers to Law Enforcement (LE) BACKGROUND The Washington Post Magazine (Sellers, 2015) described a fictional...
The Good, Bad & Ugly The hype on artificial intelligence (AI) is in two camps: it's the best thing ever...
How can Predictive Analytics (PA) move forward to improve our ability to better anticipate problems and threats? The use of...
Some Suggestions for the Department of Defense A Hybrid-Risk Management Framework (RMF) Step 3 A challenge facing the Department of...
While not greatly different, there are some unique variations The history of Risk Management (RM) can be traced to the...
A review of academic work addressing how to improve cybersecurity Larrimore, N. P. (2018). Risk management strategies to prevent and...
We consider the following mini-framework This is a discussion on an emerging cybersecurity tactical approach to inject an even lower...
A Case Analysis SUPREME COURT OF THE UNITED STATES City of Ontario, California, Et. Al. v. QUON Et Al. Certiorari...
It's All About the Insider Threat Personnel Security controls may seem cumbersome and involved, especially when talking about unclassified systems....
The Differences between the "Deep" and "Dark" Web Some people have heard of the Dark Web, many others have not....
Wilson, J. (2015). China's Position on the Sony Attack: Implications for the US Response. Washington, DC: US-China Economic and Security...
Expectations Beyond DOD In late 2018, the expectation is that the United States (US) federal government will expand the National...
Is a DDOS Considered an "Armed Attack"? In this post, we look at what may occur diplomatically, politically, and militarily...
111F Supp 2d 294(U.S. Dist. Ct., So Dist. NY, 2000) Historical and legal considerations that play a role in policy...
An essay on the role of how HUMAN beings play a vital role in the future of data analytics ...
How NIST 800-171 May Be The Better Solution To-date The CCPA provides California residents the right: To know what personal...
An Opportunity to Show Your Expertise We are looking for 3 guest-bloggers to help us refine this entry of the...
NIST Frameworks that Fit In the age of lean and agile development, can “Agile Cybersecurity” fit into these paradigms? Is...
Defining Continuous Monitoring Cybersecurity is not about shortcuts. There are no easy solutions to years of leaders demurring their responsibility...
What is the best way to think about the POAM Lifecycle? In Brief Using the US Intelligence Community’s Intelligence Cycle...
Our Inaugural Release! "The Cyber Sentinel" is dedicated to "the good, the bad and the ugly of cybersecurity." WEEK 2:...