Published inThe Recovering AnalystCISA’s Zero Trust Maturity Model is Definitely Single-PlyZero Trust is quickly becoming an industry best practice internationally, here’s why you shouldn’t be using the ZTMM to meet these…9h ago9h ago
Published inThe Recovering AnalystHow To Own Twenty Percent of the Internet in Ten GuessesPublished research on password cracking using combolists and various AI techniques to target users.Aug 271Aug 271
Published inThe Recovering AnalystYour Security Data Strategy Sucks Because You Don’t Have OneStop managing alerts and develop a successful data strategy. Important lessons from the data economy and how to improve your SOC.Oct 14, 2022Oct 14, 2022
Published inThe Recovering AnalystHow I Learned To Stop Worrying And Love… Autonomous Security?Hating the term autonomous security isn’t going to make it go away. Here’s a guide to understanding the promise and a plea for…Jun 17, 2022Jun 17, 2022
Published inThe Recovering AnalystWhen Scale Outpaces Human Intervention, It’s Not a People ProblemManual processes are rubbish. People are slow. Automation is the only way we can keep up with the automation leveraged by our adversaries.May 12, 2022May 12, 2022
Published inThe Recovering AnalystThe MITRE ATT&CK Evaluation Needs To EvolveA recovering analysts thoughts on how MITRE has moved the industry and how it now needs to evolve to support enterprise companies.Apr 5, 2022Apr 5, 2022
Published inThe Recovering AnalystDemystifying Zero TrustZero Trust is a fundamental approach to securing an environment and no one really understands it… Let’s fix that.Jun 29, 2021Jun 29, 2021
Published inThe Recovering AnalystXDR Requires SOAR In Enterprise EnvironmentsDon’t settle for half baked SOAR capabilities slapped on an XDR solution when your organization requires enterprise response…May 25, 2021May 25, 2021
Published inThe Recovering AnalystDon’t let Vendor Exuberance Distract from the Value of the MITRE ATT&CK EvaluationThe MITRE ATT&CK Evaluation is published as a scientific data set to enable you to interpret information about specific products such as…Apr 23, 2021Apr 23, 2021
Published inThe Recovering AnalystCan XDR Survive Outside of SIEM?Analyzing the threat detection market through the lens of EDR, XDR, and SIEM to predict the next 5 years of innovation in the space.Mar 23, 20211Mar 23, 20211