A Pilot Program for Critical Infrastructure
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools,…
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools,…
A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from…
This summary of a technical analysis of the Evilnum Campaign by ESET gives a typical example of the type of reporting cyber…
The rapid advancements in cyber capabilities among nation-states and non-state actors alike have made the cyber domain a principal battleground, requiring military…
In a striking revelation that underscores the escalating tensions between Russia and Ukraine, a coalition of Western intelligence agencies has brought to…
Commercial facilities require special considerations for designing physical security operations.
With the right foundation and ongoing engagement, an ISAC can significantly enhance an organization's resilience to cybersecurity threats.
Throughout time artists have tried to capture the agony of war, and philosophers have tried to capture the beauty of struggle for…
No single solution can provide complete protection against all cybersecurity threats. The most effective strategy involves a layered approach, combining several measures…
The STIX2.1 data model is an important tool for developers of software in the cyber threat intelligence area because it provides a…