Kevin
-
Recent Posts
- “Harmonizing the Digital Symphony: The Essential Role of Cybersecurity Detection Engineers in Safeguarding Cyber Landscapes”
- Cybersecurity Deception Engineers: The Unseen Guardians of Cybersecurity Programs and the Unsung Heroes in the Battle Against Cyber Threats
- Offense for Defense: The Art and Science of Cybersecurity Red Teaming
- DEFENSE IS THE BEST OFFENSE: THE EVOLVING ROLE OF CYBERSECURITY BLUE TEAMS AND THE IMPACT OF SOAR TECHNOLOGIES
- SECURING CORPORATE IoT DEVICES: CHALLENGES, STRATEGIES, AND THE ROLE OF AI AND ML IN CYBERSECURITY
Archives
-
Tag Archives: information assurance
“Harmonizing the Digital Symphony: The Essential Role of Cybersecurity Detection Engineers in Safeguarding Cyber Landscapes”
“Cybersecurity Detection Engineers play a crucial role as frontline experts, identifying threats and facilitating rapid responses. These professionals are a vital part of the blue team, and their expertise in detection capabilities significantly enhances defenses and reduces the noise floor. … Continue reading
Cybersecurity Deception Engineers: The Unseen Guardians of Cybersecurity Programs and the Unsung Heroes in the Battle Against Cyber Threats
“Cybersecurity Deception Engineers, the unseen guardians of cybersecurity, craft a deceptive digital landscape. They turn potential vulnerabilities into traps, thwarting threats and illuminating the intentions of cyber adversaries.” – Kevin Lynn McLaughlin, PhD In the unending expanse of the digital … Continue reading
Offense for Defense: The Art and Science of Cybersecurity Red Teaming
“Embracing the principles of Cybersecurity Red Teaming not only fortifies an organization’s digital defenses but fosters a proactive mindset that is essential for thriving in the ever-evolving cyber threat landscape. It is through this strategic fusion of innovation, collaboration, and … Continue reading
DEFENSE IS THE BEST OFFENSE: THE EVOLVING ROLE OF CYBERSECURITY BLUE TEAMS AND THE IMPACT OF SOAR TECHNOLOGIES
ABSTRACT. The article delves into the intricacies, tools, approaches, and tactics utilized by Cybersecurity Blue Teams, as well as the essential planning practices that lay the foundation for successful operations. The effectiveness of Blue Team operations relies on the proficiency … Continue reading
SECURING CORPORATE IoT DEVICES: CHALLENGES, STRATEGIES, AND THE ROLE OF AI AND ML IN CYBERSECURITY
The rapid proliferation of IoT devices within corporate infrastructures has left organizations more vulnerable than ever to cyberattacks. It is essential to adopt a comprehensive approach that incorporates various techniques, tools, and emerging technologies, such as AI and ML, to … Continue reading
Posted in Critical Manufacturing Cyber Security
Tagged compliance, cyber security, Cyber Security Incident Response, cybersecurity AI, cybersecurity IoT, Cybersecurity ML, Cybersecurity SOAR, information assurance, information security, information system security, risk assessment, Security
1 Comment
“Unlocking Leadership Excellence: One Cybersecurity Executive’s Guide to Essential Reads for Aspiring Team Leaders”
“In the pursuit of leadership excellence, the wisdom gleaned from the works of esteemed authors can serve as a guiding beacon, empowering aspiring team leaders to navigate the complexities of the cybersecurity landscape with confidence, agility, and foresight.” – Kevin … Continue reading
EDPACS _ 2023 _ Kevin Lynn McLaughlin, PhD & Erik S. A. Elliott
EDPACS _ 2023 _ Kevin Lynn McLaughlin, PhD & Erik S. A. Elliott Unleashing the Power of Mobile Threat Hunting Toolkits: Why They Are Crucial in Today’s Cybersecurity Landscape “Mobile threat hunting toolkits are a crucial component of modern cybersecurity … Continue reading
Sometimes you need a who, A what, no – a who, oh ok
It always surprises me when I meet a novice or someone who is new to a field or new to a role and they are embarrassed to ask for help. Even worse is when they are afraid that receiving feedback … Continue reading
Pollyanna Leadership?
“Positive leadership isn’t just about being optimistic, it’s about acknowledging challenges while emphasizing resilience and a can-do attitude. It empowers individuals and inspires teams to take risks, embrace change, learn from mistakes and work together to overcome obstacles. Unlike authoritarian … Continue reading
Retaining Cybersecurity Talent
. Kevin M’s Tips For Retaining Top Cybersecurity Talent As the cybersecurity threat landscape continues to evolve, it’s important to have a talented and skilled team in place to protect your organization’s assets and data. However, finding and retaining cybersecurity … Continue reading