Maximizing ROI in Cybersecurity: Why Data-Driven Control Selection Matters
The literature included in their meta-analysis only included studies based on empirical evidence that investigated the statistical relationship between security controls and…
Articles on cyber policy.
The literature included in their meta-analysis only included studies based on empirical evidence that investigated the statistical relationship between security controls and…
This article delves into the works of 13 prominent authors from China. Summaries of articles about the other countries will follow in…
Cybersecurity analysts typically form a specific expertise in the critical infrastructure area that they work in. This is important because the tools,…
Throughout time artists have tried to capture the agony of war, and philosophers have tried to capture the beauty of struggle for…
One key area where STIX and TAXII can be leveraged is in the realm of national security and intelligence analysis.
Informed decisions for sustainable production and consumption can lead to increased cooperation between countries and more successful climate change policies and actions.
Two sides are battling for your mind and soul on the Internet. It is also a global hybrid conflict we are facing.…
The Annual Report issued by the European Union’s (EU) Network and Information Security Agency (ENISA) has recently been released for patterns observed…
Editors Note: On occasion I go back and reread some of my earlier articles to guage how my own views are changing.…
EU’s ENISA will be holding a thought leadership meeting in Rome to bring together key organizations involved in the cyber threat analysis…