“Fake News” Must Learn to Regulate Itself!

Digital interaction has surpassed interpersonal interaction — even grandmothers primarily interact with their grandchildren via iPad.  Almost everything we do can be done via an App or online, before long that’ll be the only way we can do anything. We have a word for this and that is “critical infrastructure,” and as a society we

Rules vs. Reasoning in the Security Ops Center

For the last 15 years, Security Ops Centers have been using rules (aka Boolean logic) to describe situations that look like an attack from the logs collected into their SIEM solutions. As an industry-wide standard practice, the intent is to reduce the volume of events to a reasonable level so that a human can effectively analyze them.

The Origins of the Security War Room

In 2001, I was a relatively new Security Operations Center manager for IBM’s Managed Security Services Delivery (yay, MSSD!).  On a Friday night relaxing at home, I was a few beers into my evening, when the phone rang.