You Against the World: The Offenders Dilemma - Foreign attackers have many more toolsets at their disposal, so we need to make sure we’re selective about our modeling, preparation and how we assess and fortify ourselves. (Tom Eston)
Know Your Audience When Speaking to Security Practitioners - How can security practitioners make sense of the vendor landscape and separate those who talk a good game from those who can execute, perform, and solve real problems for enterprises? (Joshua Goldfarb)
Cybersecurity Mesh: Overcoming Data Security Overload - A significant cybersecurity challenge arises from managing the immense volume of data generated by numerous IT security tools, leading organizations into a reactive rather than proactive approach. (Torsten George)
The OODA Loop: The Military Model That Speeds Up Cybersecurity Response - The OODA Loop can be used both by defenders and incident responders for a variety of use cases such as threat assessment, threat monitoring, and threat hunting. (Etay Maor) |
No comments:
Post a Comment
Please leave a comment about our recent post.