MM-ISAC Blog

Digging into cyber resilience in mining and metals.

4 min read

Guide to Traffic Light Protocol (TLP)

Key Points: TLP is a Sharing Protocol. Companies that do not share threat information are at a disadvantage. Overclassification stifles sharing -Strive to share with the least restriction for the broadest sharing potential. The information source...

Read More

3 min read

Why is Cybersecurity in Mining More Important Now than Ever? - The Race to Secure Critical Minerals

If you work in cybersecurity in mining, it is easy to forget why we do what we do. We are not in the cybersecurity business; we are not merely...

Read More

3 min read

Building a Phishing Program

Phishing is a significant compromise vector for all companies in all industries. At theMining and Metals ISAC annual conference in November, we...

Read More

4 min read

Digging Into Security Cost

After my last post on using Security Cost as a metric and the basis for a core security team/CISO objective, a few Mining and Metals ISAC members...

Read More

3 min read

The Hermeneutics of Cyber Threat Intelligence Part 3: Planning and Curation

What does a Greek god, a German philosopher, and a Museum Curator have to teach us about Cyber Threat Intelligence?

Read More

4 min read

The Hermeneutics of Cyber Threat Intelligence Part 2: Answering Why?

Why? Why? Three letters, one powerful question. We all ask why. Possibly the very first question you've ever asked anyone was, "Why?"

Read More

5 min read

The Hermeneutics of Cyber Threat Intelligence – Part 1: Tactical Briefings

This article will be the first of a series on how centuries-old techniques in interpretation – Hermeneutics can be used to interpret information to...

Read More

2 min read

The CrowdStrike Incident - Resilience Matters

Now that most MM-ISAC member organizations impacted by CrowdStrike's issue on Friday are through the worst of the recovery, I want to share some...

Read More

9 min read

Making Your Operation More Cyber Resilient

In last quarter's article, I discussed the process for established IT Security teams to expand their influence into OT. This quarter I want to give...

Read More

3 min read

Threat Actors Delay Dumping Data Post Breach

Threat intelligence can be extremely valuable for informing business decisions and strategies beyond detection and response, enabling agility in...

Read More