Cybersecurity- Insiders

Breaking the OODA Loop!

Lance Cottrell wrote an interesting post about Breaking the OODA Loop! that I would like to share. "The OODA loop is a well established concept often...
Cybersecurity- Insiders

A Spell Check Equivalent for Building Security In

Jim Ivers  wrote an interesting post about A Spell Check Equivalent for Building Security In that I would like to share. "I can honestly say that spell...
Cybersecurity- Insiders

Want Better Security? Be a Pragmatist.

Joshua Goldfarb wrote an interesting post about Want Better Security? Be a Pragmatist. that I would like to share. "I’ve always considered myself a pragmatist.  Perhaps not...
Cybersecurity- Insiders

Using Apache Hadoop to Meet Cybersecurity Challenges

Rocky DeStefano wrote an interesting post about Using Apache Hadoop to Meet Cybersecurity Challenges that I would like to share. "Apache Hadoop turned 10 this year. What...
Cybersecurity- Insiders

Malware Increasingly Abusing WMI for Evasion

Ionut Arghire  wrote an interesting post about Malware Increasingly Abusing WMI for Evasion that I would like to share. "Malware is increasingly using Windows Management Instrumentation...
Cybersecurity- Insiders

How to Make Threat Intelligence Practical for Your Organization

Adam Meyer wrote an interesting post about How to Make Threat Intelligence Practical for Your Organization that I would like to share. "f there is a...
Cybersecurity- Insiders

The Cyber Risk of Mixing Business with Pleasure

 Alastair Paterson wrote an interesting post aboutThe Cyber Risk of Mixing Business with Pleasure that I would like to share. "Technical and Process Controls for the...
Cybersecurity- Insiders

Hitting the Right Note With a Security Delivery Platform

Erin O’Malley  wrote an interesting post about  Hitting the Right Note With a Security Delivery Platform that I would like to share. "In 1985, F. Murray...
Cybersecurity- Insiders

Zero Trust or Bust?

Torsten George  wrote an interesting post about Zero Trust or Bust? that I would like to share. "Implementing a Zero Trust Model Represents a Dramatic Change...
Cybersecurity- Insiders

Firewall Migrations: Five Ways to Maximize Security Resilience & Availability

Marie Hattar  wrote an interesting post about Firewall Migrations: Five Ways to Maximize Security Resilience & Availability that I would like to share. "If you...