3 min read
The Hermeneutics of Cyber Threat Intelligence Part 3: Planning and Curation
What does a Greek god, a German philosopher, and a Museum Curator have to teach us about Cyber Threat Intelligence?
Read More
3 min read
What does a Greek god, a German philosopher, and a Museum Curator have to teach us about Cyber Threat Intelligence?
Read More
4 min read
Why? Why? Three letters, one powerful question. We all ask why. Possibly the very first question you've ever asked anyone was, "Why?"
5 min read
This article will be the first of a series on how centuries-old techniques in interpretation – Hermeneutics can be used to interpret information to...
2 min read
Now that most MM-ISAC member organizations impacted by CrowdStrike's issue on Friday are through the worst of the recovery, I want to share some...
9 min read
In last quarter's article, I discussed the process for established IT Security teams to expand their influence into OT. This quarter I want to give...
3 min read
Threat intelligence can be extremely valuable for informing business decisions and strategies beyond detection and response, enabling agility in...
12 min read
For those of you who missed our first webinar of the year, I discussed a process for integrating IT and OT security —specifically, extending your IT...
2 min read
The hardest part of recruiting more women into this industry is getting them interested in the field. Thinking back on the careers I have considered,...
2 min read
When I describe my job to others, I tell them: My job is simple. I get companies to work together to solve their cybersecurity problems. I’m not a...