Cherie Burgett

1 min read

A Cautionary Note on Sensationalism in Cyber Security Headlines

This month’s focus is on the importance of double-checking the work of security researchers and headlines. We live in a fast-paced news cycle and a rapidly changing threat landscape, driven by the geopolitical climate and advances in technology,...

Read More

2 min read

Moral Frameworks in CTI and High-Stakes Communications

We live in very polarizing times, particularly in the US. We choose our words carefully, tiptoe around topics that might devolve into argumentation...

Read More

1 min read

Mining and Metals Incidents More Than Double in the First Quarter of 2025

At the Mining and Metals ISAC, we monitor cyber incidents and track trends within the mining and metals sector. Compared to last year, incidents have...

Read More

4 min read

Guide to Traffic Light Protocol (TLP)

Key Points: TLP is a Sharing Protocol. Companies that do not share threat information are at a disadvantage. Overclassification stifles sharing...

Read More

3 min read

Why is Cybersecurity in Mining More Important Now than Ever? - The Race to Secure Critical Minerals

If you work in cybersecurity in mining, it is easy to forget why we do what we do. We are not in the cybersecurity business; we are not merely...

Read More

3 min read

The Hermeneutics of Cyber Threat Intelligence Part 3: Planning and Curation

What does a Greek god, a German philosopher, and a Museum Curator have to teach us about Cyber Threat Intelligence?

Read More

4 min read

The Hermeneutics of Cyber Threat Intelligence Part 2: Answering Why?

Why? Why? Three letters, one powerful question. We all ask why. Possibly the very first question you've ever asked anyone was, "Why?"

Read More

5 min read

The Hermeneutics of Cyber Threat Intelligence – Part 1: Tactical Briefings

This article will be the first of a series on how centuries-old techniques in interpretation – Hermeneutics can be used to interpret information to...

Read More

3 min read

Threat Actors Delay Dumping Data Post Breach

Threat intelligence can be extremely valuable for informing business decisions and strategies beyond detection and response, enabling agility in...

Read More

2 min read

How to Encourage Women to Pursue a Career in Cybersecurity

The hardest part of recruiting more women into this industry is getting them interested in the field. Thinking back on the careers I have considered,...

Read More