• Measuring Cyber Security Success

    The call for measuring cyber security success - the ability to provide information metrics about the posture of the network, which can be used to assess the level of threats, and to decide when to heighten security postures due to perceived risks. Often this can be a misunderstood philoso...Read more Arrow

  • Darwinism for Ransomware

    Evolution and adaptation is required for persistence in the ransomware industry.  Cerber ransomware has been around for quite a while, and may variants are out in the wild.  It has kept itself alive by constant adaptation and jumping ahead of technology advancements by using old...Read more Arrow

  • Threat Intel, Detection and Response

    Threat detection and response is one of the most complicated and dynamic areas of a Computer Network Defense strategy. There are many different views regarding how a Threat Detection operation should be implemented, however it is essential that the security posture of the enterprise is kn...Read more Arrow