Applying the OODA Loop to Cybersecurity Will Help Accelerate the Process of Translating Threat Data Into Action
Hi, what are you looking for?
Applying the OODA Loop to Cybersecurity Will Help Accelerate the Process of Translating Threat Data Into Action
In the world of big data there’s something I refer to as “the Goldilocks effect” and it’s particularly problematic when it comes to cyber...
Automating Steps in the Security Process is Critical to Defeat Today’s Relentless and Complex Attacks
“What if only a machine could defeat another machine?”
Six years ago the US National Institute of Standards and Technology (NIST) put forth a framework for information security continuous monitoring (ISCM), defined as...
In my last article I shared five steps you can take to turn threat intelligence into a threat operations program, putting yourself in a...
Last month at the Gartner Security and Risk Management conference, I had the opportunity to speak with many CISOs, analysts and other security professionals....
Applying Unfiltered Threat Intelligence to Defenses Generates Significant False Positives
Late last year, a study by the US National Institute of Standards and Technology (NIST) took an in-depth look at a phenomenon called “security...
Instead of Discounting Indicators of Compromise, it’s Time to Use Them More Effectively
My good friend and (full disclosure) ThreatQuotient Board member, Marty Roesch, once said in a meeting, “Complexity is the enemy of security.” Not sure...
Defense-in-depth. It’s a philosophy we’re all familiar with: layering defenses so that if one fails, another layer is there to stop the attack. Sounds...