Kevin
-
Recent Posts
- “Harmonizing the Digital Symphony: The Essential Role of Cybersecurity Detection Engineers in Safeguarding Cyber Landscapes”
- Cybersecurity Deception Engineers: The Unseen Guardians of Cybersecurity Programs and the Unsung Heroes in the Battle Against Cyber Threats
- Offense for Defense: The Art and Science of Cybersecurity Red Teaming
- DEFENSE IS THE BEST OFFENSE: THE EVOLVING ROLE OF CYBERSECURITY BLUE TEAMS AND THE IMPACT OF SOAR TECHNOLOGIES
- SECURING CORPORATE IoT DEVICES: CHALLENGES, STRATEGIES, AND THE ROLE OF AI AND ML IN CYBERSECURITY
Archives
-
Monthly Archives: May 2022
A Risk Approach to Cybersecurity Vulnerability Management McLaughlin, 2022
When first arriving at an organization that has not invested in a major cybersecurity program and then looking at the sheer number of computer vulnerabilities in the environment a sense of feeling overwhelmed is a common initial response. In many … Continue reading
Posted in Uncategorized
Leave a comment