CYBER DECEPTION: Impact to Cybersecurity and the Application of Machine Learning Tools
Cyber deception is a relatively new approach to cybersecurity that involves creating fake digital assets, such as fake websites or...
Cyber deception is a relatively new approach to cybersecurity that involves creating fake digital assets, such as fake websites or...
CYBERSECURITY REQUIRES A HOLISTIC APPROACH AT ALL LEVELS The Department of Defense (DoD) is critical in protecting the United States...
A CYBER-SHORT FOR BUSINESSES: NOT QUITE THE ALAMO, BUT GETTING MORE CHALLENGING Cybersecurity is an increasingly important concern for businesses...
DEFENDING AGAINST ONGOING CYBER-ASSAULTS As a company or business, it is essential to prioritize the protection of your computer infrastructure...
Applying the Qualitative to Frame Quantitative Analysis Abstract A significant challenge facing businesses and agencies is how to focus limited...
On January 31, 2020 several issues answered by the DOD specific to the CMMC. In 2019, the Department of Defense...
A Prognostication for the Arm-chair Cyber Generals In 2019, the Department of Defense (DOD) announced the development of the Cybersecurity...
In the Background way too Long... Nagrecha and Chawla’s (2106) and Zuech et al.’s (2015) works are historical and seminal...
The Internet of Things (IoT) is the most pervasive and wide-spread expression of the Information Age since the introduction of...
What are we still missing ? Background Ezeife, Dong, and Aggarwal (2008) describe the frustrations of intrusion detection of cyber-threats...
Where do we draw the line between privacy and security? This is becoming more and more relevant with advances in...
A Cybersecurity "Strawman" Offering Supply chain risks include the insertion of counterfeits, unauthorized production, tampering, theft, insertion of malicious software...
Should the US ever self-attribute publicly? Does the nature of cyberspace make a difference in whether an activity is characterized...
2 WEEKS LEFT The F-35 joint program office issued a one-year Authority to Operate (ATO) in March 5, 2018 for...
The PPT "Triangle" is at the root of this issue Origins The People-Process-Technology (PPT) Triangle has a less than defined...
Was it really worth it? The Intelligence Community (IC) recently released its Cyber Threat Framework (CTF). They have been working...
The Four Key Components Best Practice has been a long held position by many communities to include program management and...
These myths are holding us back. We need to think more critically of the implications and impacts Myth 1: "Information...
What does this mean for federal contractors? The September 2018 "National Cyber Strategy" was released by President Trump with barely...