MM-ISAC Blog

Digging into cyber resilience in mining and metals.

3 min read

The Hermeneutics of Cyber Threat Intelligence Part 3: Planning and Curation

What does a Greek god, a German philosopher, and a Museum Curator have to teach us about Cyber Threat Intelligence?

Read More

4 min read

The Hermeneutics of Cyber Threat Intelligence Part 2: Answering Why?

Why? Why? Three letters, one powerful question. We all ask why. Possibly the very first question you've ever asked anyone was, "Why?"

Read More

5 min read

The Hermeneutics of Cyber Threat Intelligence – Part 1: Tactical Briefings

This article will be the first of a series on how centuries-old techniques in interpretation – Hermeneutics can be used to interpret information to...

Read More

2 min read

The CrowdStrike Incident - Resilience Matters

Now that most MM-ISAC member organizations impacted by CrowdStrike's issue on Friday are through the worst of the recovery, I want to share some...

Read More

9 min read

Making Your Operation More Cyber Resilient

In last quarter's article, I discussed the process for established IT Security teams to expand their influence into OT. This quarter I want to give...

Read More

3 min read

Threat Actors Delay Dumping Data Post Breach

Threat intelligence can be extremely valuable for informing business decisions and strategies beyond detection and response, enabling agility in...

Read More

12 min read

Integrating IT and OT Security - A 6 Step Cycle

For those of you who missed our first webinar of the year, I discussed a process for integrating IT and OT security —specifically, extending your IT...

Read More

2 min read

How to Encourage Women to Pursue a Career in Cybersecurity

The hardest part of recruiting more women into this industry is getting them interested in the field. Thinking back on the careers I have considered,...

Read More

2 min read

Unifying Cyber Defense Through Collaboration

When I describe my job to others, I tell them: My job is simple. I get companies to work together to solve their cybersecurity problems. I’m not a...

Read More