Shorten the Detection Time for Threats to Increase the Success of the Cybersecurity workflow
Knowledge Graphs and Volatility Introduction The goal of this post is to show how knowledge graphs can be used to
Knowledge Graphs and Volatility Introduction The goal of this post is to show how knowledge graphs can be used to
Analyzing live memory streams can be a powerful technique for detecting cyber threats, especially advanced persistent threats (APTs) and sophisticated
Continue readingAnalysis of Live Memory Streams to Detect Cyberthreats
Introduction From CoPilot: “The F3EAD framework is an alternative intelligence cycle commonly used within Western militaries for operations that typically
Continue readingF3EAD – Infusing Real Time Intel Into the Operational Flow
Back in the day, way back, there were groups of folks tagged as Cro-Magnon. These folks understood kinetic warfare –
There are differing opinions on where AI/ML solutions are and where humans are as far as being able to accomplish
A more detailed explanation can be found in the document SP 800-207. Identity – The New Perimeter From NIST —
From Wikipedia – “The attack surface of a software environment is the sum of the different points (for “attack vectors“) where an unauthorized user
Chaos – “behavior so unpredictable as to appear random, owing to great sensitivity to small changes in conditions.” There are
Far more folks use mobile devices than desktops to access social media sites than they use desktops. Since many Social
In a previous post, I did a walk-through of installing GrapheneOS on a pixel phone. Labor invested was about 30