AI is no longer just a futuristic buzzword in cybersecurity; it’s now the force multiplier behind everything from spam filters…
Imagine trusting your most important decisions to someone who quietly sabotages your lessons, teaching your systems to misclassify malware, ignore…
Cybersecurity today is a race against time—and machines. With AI-powered threats evolving faster than ever and traditional defenses struggling to…
My book, The Cybersecurity Trinity: Artificial Intelligence, Automation, and Active Defense, is now available for preorder on most sites, including…
This is the third in a multipart series that explores machine learning (ML) within cybersecurity. The first post in this series provided…
Today, I will discuss the threat intelligence process at a fictional but typical financial organization called DPS. The threat intelligence…
Ty Detmer was a better quarterback than Tom Brady because of his superior passing skills. Detmer won the Heisman Trophy…
This is the second in a multi-part series that explores machine learning (ML) within cybersecurity. The first post in this…
This post is the first in a multi-part series exploring machine learning (ML) within cybersecurity. When I first entered the…
Imagine deepfake footage of a major, high-profile company CEO engaging in bribery, U.S. military personnel committing atrocities on foreign soil,…
Recently, I was asked my opinion regarding the most important role of a security engineer. This question made me think…
I will be presenting at the Borderless Cyber Conference in Washington, D.C. My presentation is scheduled for October 8th. I…
I recently had my first article published in a peer-reviewed journal. The Cyber Security & Information Systems Information Analysis Center…
As most of you know, I am a doctoral student at Colorado Technical University working on my dissertation. My research…
Organizations face a serious threat of data breaches caused by company insiders [1,2]. Traditional data loss prevention (DLP) tools and…
November 26, 2018, will mark the 10th anniversary of an incredible terrorist attack on Mumbai that shocked the world and…
Several years ago, when my son was in grade school, I was honored to represent the Marine Corps at a…
In previous posts, I have discussed the use of security automation and intelligence sharing to decrease the time to detect…
This week, I turn my attention to the concepts of denial and deception and their application to intelligence. Next week…
Next week, on 10/02 and 10/03, Johns Hopkins University Applied Physics Lab (JHU-APL) will be hosting the next Integrated Cyber…