Drones and the US Air Force

Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change. The F-35A certainly remains an important platform ...

Dream Job, or Is It?

In the summer of 2020, ClearSky, a venture capital and growth equity firm investing in innovative companies in the cybersecurity and sustainable energy sectors, investigated into a campaign dubbed "Dream Job," highly ...
SANS Johnson Controls Trojan Smart Home Leaks Lead to Cyberattacks

SANS Institute Survey Surfaces State of Cybersecurity Defenses

A SANS Institute survey found most orgs felt they had the right policies, processes and controls defined, but only 67% had metrics to prove it ...
Security Boulevard
AI, defense, cybersecurity,

How AI is Transforming Defensive Cybersecurity

In the rapidly evolving world of cybersecurity, adopting artificial intelligence (AI) is proving to be a game changer for defense teams. AI offers a multitude of benefits, revolutionizing defensive operations and providing ...
Security Boulevard
cybersecurity quantum

A Strategic Approach to Cybersecurity Resilience

While most organizations understand the importance of cybersecurity, many are still unsure about the meaning of cyber resilience. According to the National Institute of Standards and Technology (NIST), cyber resilience is defined ...
Security Boulevard
awareness cybersecurity teach

Raising Awareness of Connected Device Security

October is officially cybersecurity awareness month, originally designated back in 2004 by United States President George W. Bush and Congress to raise awareness of the growing cybersecurity threat landscape that affects businesses, ...
Security Boulevard

Cyberwar Lessons from the War in Ukraine

The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “The Cyber Defense Assistance Imperative ­ Lessons from ...
The Defender’s Guide to Windows Services

The Defender’s Guide to Windows Services

It’s dangerous to find malicious services alone! Take this!Authors: Luke Paine & Jonathan JohnsonIntroductionThis is the second installment of the Defender’s Guide series. In keeping with the theme, we are discussing Windows Services, the ...
threat-informed defense

Threat-Informed Defense 101: Understanding the Basics

Over the last decade, the MITRE ATT&CK knowledge base has been widely adopted by thousands of security defenders, ultimately forming a strong community for ATT&CK users. Security teams have leveraged ATT&CK to ...
Security Boulevard
threat-hunting program. threat hunting, teams, intelligence, Edge Devices data threats IT cybersecurity defense attack alerts machine identity management insider threats security phishing Cybersecurity Threats on the Rise

Graph-Fueled Defense-in-Depth Can Strengthen Security Posture

“GM Customer Accounts Hacked”, “Hacker Steals Database of Hundreds of Verizon Employees”, “Ransomware Attack Hits New Jersey County”. Another day, another breach, hack or ransomware attack. In fact, the average cost of a ...
Security Boulevard