1 min read
A Cautionary Note on Sensationalism in Cyber Security Headlines
This month’s focus is on the importance of double-checking the work of security researchers and headlines. We live in a fast-paced news cycle and a...
1 min read
This month’s focus is on the importance of double-checking the work of security researchers and headlines. We live in a fast-paced news cycle and a...
2 min read
We live in very polarizing times, particularly in the US. We choose our words carefully, tiptoe around topics that might devolve into argumentation...
1 min read
At the Mining and Metals ISAC, we monitor cyber incidents and track trends within the mining and metals sector. Compared to last year, incidents have...
4 min read
Key Points: TLP is a Sharing Protocol. Companies that do not share threat information are at a disadvantage. Overclassification stifles sharing...
3 min read
If you work in cybersecurity in mining, it is easy to forget why we do what we do. We are not in the cybersecurity business; we are not merely...
3 min read
What does a Greek god, a German philosopher, and a Museum Curator have to teach us about Cyber Threat Intelligence?
4 min read
Why? Why? Three letters, one powerful question. We all ask why. Possibly the very first question you've ever asked anyone was, "Why?"
5 min read
This article will be the first of a series on how centuries-old techniques in interpretation – Hermeneutics can be used to interpret information to...
3 min read
Threat intelligence can be extremely valuable for informing business decisions and strategies beyond detection and response, enabling agility in...
2 min read
When I describe my job to others, I tell them: My job is simple. I get companies to work together to solve their cybersecurity problems. I’m not a...