Breaking the OODA Loop!
Lance Cottrell wrote an interesting post about Breaking the OODA Loop! that I would like to share.
"The OODA loop is a well established concept often...
A Spell Check Equivalent for Building Security In
Jim Ivers wrote an interesting post about A Spell Check Equivalent for Building Security In that I would like to share.
"I can honestly say that spell...
Want Better Security? Be a Pragmatist.
Joshua Goldfarb wrote an interesting post about Want Better Security? Be a Pragmatist. that I would like to share.
"I’ve always considered myself a pragmatist. Perhaps not...
Using Apache Hadoop to Meet Cybersecurity Challenges
Rocky DeStefano wrote an interesting post about Using Apache Hadoop to Meet Cybersecurity Challenges that I would like to share.
"Apache Hadoop turned 10 this year.
What...
Malware Increasingly Abusing WMI for Evasion
Ionut Arghire wrote an interesting post about Malware Increasingly Abusing WMI for Evasion that I would like to share.
"Malware is increasingly using Windows Management Instrumentation...
How to Make Threat Intelligence Practical for Your Organization
Adam Meyer wrote an interesting post about How to Make Threat Intelligence Practical for Your Organization that I would like to share.
"f there is a...
The Cyber Risk of Mixing Business with Pleasure
Alastair Paterson wrote an interesting post aboutThe Cyber Risk of Mixing Business with Pleasure that I would like to share.
"Technical and Process Controls for the...
Hitting the Right Note With a Security Delivery Platform
Erin O’Malley wrote an interesting post about Hitting the Right Note With a Security Delivery Platform that I would like to share.
"In 1985, F. Murray...
Zero Trust or Bust?
Torsten George wrote an interesting post about Zero Trust or Bust? that I would like to share.
"Implementing a Zero Trust Model Represents a Dramatic Change...
Firewall Migrations: Five Ways to Maximize Security Resilience & Availability
Marie Hattar wrote an interesting post about Firewall Migrations: Five Ways to Maximize Security Resilience & Availability that I would like to share.
"If you...
MOST POPULAR
Will 2025 be the year of no more passwords?
A once tried-and-true security measure, passwords have failed to develop at a rate necessary to keep up with the vastness of the web and...