articles

The operational tempo of the enterprise in cyberspace demands engagement of protections in cyber-relevant time. No longer can enterprises depend on human-driven processes to address the ever-increasing number of cyber events across the exponential number of devices that must be managed. Innovations in cyber threat intelligence; predictive analytics; situational awareness through artificial intelligence / machine […]

Well, it has been a long break since the last article of this series but I feel duty-bound to do this third article on cybersecurity investment since I find the possibilities resulting from a “risk-adaptive” security approach to be compelling. Generally cyber defenses must be pre-planned with cost-benefits carefully weighed prior to investing in new […]

Quantum computing is highly desired by the supercomputing community for solving a wide range of problems that are extremely difficult (if not impossible) to solve today. One example of a hard problem that will become much easier due to quantum computing is factoring large prime numbers. This hard problem forms the basis of much of […]

How Much Should I Invest in Cybersecurity? What Technology Should I Invest? Organizational risk managers and CISOs are faced with a seemingly bewildering set of investment choices and decision methods for determining the monetary amount and best technical options for cybersecurity investment. Cybersecurity investment business cases are often hard to justify since cyber operations usually […]

Cloud Access Security Brokerage
Security Process Automation

Proactive with a Personal Touch I was talking with a friend lately about proactive security. She mentioned a “proactive” practice she employed several years ago as a staff member of the security department of a large local bank when new system administrators were brought on board. The bank’s CISO had identified several security best practices […]