Defense
Drones and the US Air Force
Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change. The F-35A certainly remains an important platform ...
Dream Job, or Is It?
In the summer of 2020, ClearSky, a venture capital and growth equity firm investing in innovative companies in the cybersecurity and sustainable energy sectors, investigated into a campaign dubbed "Dream Job," highly ...
SANS Institute Survey Surfaces State of Cybersecurity Defenses
A SANS Institute survey found most orgs felt they had the right policies, processes and controls defined, but only 67% had metrics to prove it ...
How AI is Transforming Defensive Cybersecurity
In the rapidly evolving world of cybersecurity, adopting artificial intelligence (AI) is proving to be a game changer for defense teams. AI offers a multitude of benefits, revolutionizing defensive operations and providing ...
A Strategic Approach to Cybersecurity Resilience
While most organizations understand the importance of cybersecurity, many are still unsure about the meaning of cyber resilience. According to the National Institute of Standards and Technology (NIST), cyber resilience is defined ...
Raising Awareness of Connected Device Security
October is officially cybersecurity awareness month, originally designated back in 2004 by United States President George W. Bush and Congress to raise awareness of the growing cybersecurity threat landscape that affects businesses, ...
Cyberwar Lessons from the War in Ukraine
The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “The Cyber Defense Assistance Imperative Lessons from ...
The Defender’s Guide to Windows Services
It’s dangerous to find malicious services alone! Take this!Authors: Luke Paine & Jonathan JohnsonIntroductionThis is the second installment of the Defender’s Guide series. In keeping with the theme, we are discussing Windows Services, the ...
Threat-Informed Defense 101: Understanding the Basics
Over the last decade, the MITRE ATT&CK knowledge base has been widely adopted by thousands of security defenders, ultimately forming a strong community for ATT&CK users. Security teams have leveraged ATT&CK to ...
Graph-Fueled Defense-in-Depth Can Strengthen Security Posture
“GM Customer Accounts Hacked”, “Hacker Steals Database of Hundreds of Verizon Employees”, “Ransomware Attack Hits New Jersey County”. Another day, another breach, hack or ransomware attack. In fact, the average cost of a ...