Tag Archives: Cyber Security Incident Response

“Harmonizing the Digital Symphony: The Essential Role of Cybersecurity Detection Engineers in Safeguarding Cyber Landscapes” 

“Cybersecurity Detection Engineers play a crucial role as frontline experts, identifying threats and facilitating rapid responses. These professionals are a vital part of the blue team, and their expertise in detection capabilities significantly enhances defenses and reduces the noise floor. … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Cybersecurity Deception Engineers: The Unseen Guardians of Cybersecurity Programs and the Unsung Heroes in the Battle Against Cyber Threats

“Cybersecurity Deception Engineers, the unseen guardians of cybersecurity, craft a deceptive digital landscape. They turn potential vulnerabilities into traps, thwarting threats and illuminating the intentions of cyber adversaries.” – Kevin Lynn McLaughlin, PhD  In the unending expanse of the digital … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

Offense for Defense: The Art and Science of Cybersecurity Red Teaming 

“Embracing the principles of Cybersecurity Red Teaming not only fortifies an organization’s digital defenses but fosters a proactive mindset that is essential for thriving in the ever-evolving cyber threat landscape. It is through this strategic fusion of innovation, collaboration, and … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

DEFENSE IS THE BEST OFFENSE: THE EVOLVING ROLE OF CYBERSECURITY BLUE TEAMS AND THE IMPACT OF SOAR TECHNOLOGIES

ABSTRACT. The article delves into the intricacies, tools, approaches, and tactics utilized by Cybersecurity Blue Teams, as well as the essential planning practices that lay the foundation for successful operations. The effectiveness of Blue Team operations relies on the proficiency … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

SECURING CORPORATE IoT DEVICES: CHALLENGES, STRATEGIES, AND THE ROLE OF AI AND ML IN CYBERSECURITY

The rapid proliferation of IoT devices within corporate infrastructures has left organizations more vulnerable than ever to cyberattacks. It is essential to adopt a comprehensive approach that incorporates various techniques, tools, and emerging technologies, such as AI and ML, to … Continue reading

Posted in Critical Manufacturing Cyber Security | Tagged , , , , , , , , , , , | 1 Comment

EDPACS _ 2023 _ Kevin Lynn McLaughlin, PhD  & Erik S. A. Elliott

EDPACS _ 2023 _ Kevin Lynn McLaughlin, PhD  & Erik S. A. Elliott Unleashing the Power of Mobile Threat Hunting Toolkits: Why They Are Crucial in Today’s Cybersecurity Landscape “Mobile threat hunting toolkits are a crucial component of modern cybersecurity … Continue reading

Posted in Uncategorized | Tagged , , , , | 1 Comment

Retaining Cybersecurity Talent

.     Kevin M’s Tips For Retaining Top Cybersecurity Talent As the cybersecurity threat landscape continues to evolve, it’s important to have a talented and skilled team in place to protect your organization’s assets and data. However, finding and retaining cybersecurity … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Small and Medium Size Organizations at Risk

The bad guys are now starting to target mid-tier companies with their hacking activities.  In many cases these companies have not yet come to realize that having a Certified Chief Information Security Officer (C|CISO) or a Virtual Cerified|CISO (vC|CISO) is … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

The Office of No, Really?

  Successful ransomware attacks are at an all time high, we are losing the cyberwar, cyber criminals are making more money than ever before and it is only going to get worse, a cyber attack could be as damaging as … Continue reading

Posted in Critical Manufacturing Cyber Security, Uncategorized | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

For Cyber Security the Perimeter Still Exists and Never Went Away

  One item that really bugs me is to hear IT and Cyber Security professionals espouse that the perimeter is dead and that Cyber Security professionals should stop focusing on tools that protect the non-existing perimeter.   I was at … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | 1 Comment