Planning Your 2019 Security Budget? Consider A New Way!

As cybersecurity awareness month is upon us, there’s a lot of cybersecurity companies developing information to educate and advise security operation teams how they can be more efficient in protecting their network. A goal of mine this month was to learn as much as possible on the latest security technologies, cyber-threats and trends within the

Algorithmic Stealth and the Security Arms Race

I recently visited Norwich University, the oldest private military college in America and an NSA & DHS Center of Academic Excellence for Cyber Defense. I had the opportunity to speak with some of the students in their Computer Security and Information Assurance program, and I was asked a question by Keely Eubank about the ability

The Power of Humans Working With Machines

In a recent article from BBN Times, AI/IOT/BLOCKCHAIN expert, Ahmed Banafa, reflects on the cybersecurity issues and threats that plague organizations today. It’s no secret that cybersecurity has been and continues to be a major issue for most companies. Most noteworthy is the fact that 2017 saw a number of high-profile security incidents, 1+ year

PERCEPTION VS. REALITY: The Myth of 100 Security Data Sources

The realities of security monitoring and the promise of SIEM? In enterprise IT, data is collected from any number of IT and security devices, and then used to monitor, protect, understand and manage our technology-enabled businesses. Due to the ever-expanding attack surface, the amount of data collected today is overwhelmingly unmanageable, and ironically, we only

Ripping off the Bandage: How AI is Changing the SOC Maturity Model

The introduction of virtual analysts, artificial intelligence and other advanced technologies into the Security Operations Center (SOC) is changing how we should think about maturity models. AI is replacing traditional human tasks, and when those tasks are automated the code effectively becomes the procedure. Is that a -1 or a +10 for security operations? Let’s