Schema-Free Intelligence: Document Databases as the Backbone of Adaptive CTI Systems
The digital landscape is a battleground, with cyber threats growing more sophisticated and voluminous by the day. In this environment, Cyber Threat…
The digital landscape is a battleground, with cyber threats growing more sophisticated and voluminous by the day. In this environment, Cyber Threat…
This short overview of three separate, but complementary types of threat hunting capture the complex, multifaceted nature of modern cyber threat analysis,…
I was encouraged to find out that the most popular AI applications are actually extensions of existing tried and true tools that…
OASIS-Open's Open Cybersecurity Alliance (OCA) will be sponsoring an interoperability 'Plugfest' in the Washington, D.C. area on April 11th and 12th.
A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from…
With the right foundation and ongoing engagement, an ISAC can significantly enhance an organization's resilience to cybersecurity threats.
No single solution can provide complete protection against all cybersecurity threats. The most effective strategy involves a layered approach, combining several measures…
Combining blockchain with machine learning and artificial intelligence algorithms can enable automated threat detection and response systems. These systems can swiftly analyze…
This essay presents a short history on the development of information sharing frameworks, one feature of the recent Executive Order on cybersecurity…
Real estate agents are very busy with their own core business process and rarely have time to monitor their computer systems and…