Should You Hire a Virtual CISO?
HIRE A vCISO at Cybersentinel.ai CLICK THE LINK ABOVE As a business owner, you have a lot on your plate...
HIRE A vCISO at Cybersentinel.ai CLICK THE LINK ABOVE As a business owner, you have a lot on your plate...
CYBERSECURITY REQUIRES A HOLISTIC APPROACH AT ALL LEVELS The Department of Defense (DoD) is critical in protecting the United States...
LEARNING SHOULD NEVER END Continual learning is a crucial aspect of personal and professional development, and it is important...
Garbage in/Garbage out...why do we need good data? Data quality and consistency are crucial for data scientists because they significantly...
Cyberanalytics is the logical progression for the application of Machine Learning to Cybersecurity Protective Measures As we continue to rely...
DEFENDING AGAINST ONGOING CYBER-ASSAULTS As a company or business, it is essential to prioritize the protection of your computer infrastructure...
Clustering algorithms are a type of machine learning algorithm that can be used to identify patterns and relationships within a...
Is more data better or worse? Abstract One quantitative challenge facing experimenters in data science is how large a sample...
For those delving into a Phd Program I have had some questions from readers starting their own PhD adventure. The...
In the beginning. While it is presumed that the advent of data science and AI is a rather new phenomenon,...
What's making the current Artificial Intelligence (AI) "Summer" Possible? Rodriguez and Da Cunha (2018) describe an interrelationship between the elements...
Discussion-Thought Piece on the Future of Data Science Solutions in the Cybersecurity Battle Frontlines The world is run by ones...
We still do not have a good universal understanding of the role of leadership and the basics of RMF to...
What are we still missing ? Background Ezeife, Dong, and Aggarwal (2008) describe the frustrations of intrusion detection of cyber-threats...
Quality is not just a matter of performance Supply chain quality management efforts now require supply chain security management focus...
Quantitative and Qualitative Research Designs can no longer stand on their own Abstract The author conducts a literature review on...
How to approach a Threat Hunt using the Army Decision-Making Process Mission Planning is the foundational aspect of any Threat...
The Recent False Claims Act (FCA) Decision Markus v. Aerojet Rocketdyne Holdings Inc. May 8, 2019 THE day that changed...
"So, we are not quite Amazon, but we are excited to hit the 5K mark" Woo Hoo! We also have...
How to Demonstrate a Strong Security Posture A continuing focus on the third-leg of of the cyber-Body of Evidence (BOE),...
Some modern approaches to operational and support cyber constructs Alvarenga, A., & Tanev, G. (2017). A cybersecurity risk assessment framework...
The “Optimal” THREAT Task Organization The most common question at this point of anyone looking at the Threat Hunt concept...
Getting System Developers to get Cyber Right Early...we hope A challenge facing the Department of Defense (DOD) is the allocation...
For the budding Data Scientist, Engineer or Manager The following is part of a series on academic resources of interest...
Take Control before you are taken control of.... The lead auditor will establish evaluation criteria for the assessment of the...
What is NIST SP 800-171? In 2014, DOD adopted the overall National Institute of Standards and Technology (NIST )Risk Management...
A Quick-Start Guide Use the Cyber Incident Life Cycle to guide the company’s operational incident-handling artifact/procedure. This should be an...
Thanks all of you that have found and continue to visit the Cybersentinel Web Page We are happy to have...
This is an analysis of the Logrhythm(R) SIEM Product, its implementation, and potential cost savings focused on a DOD IT...
The must read books for 2018 These are the BEST books for the 2018 Cybersecurity Professional. These are the Top...