Gary KatzChanging Perspectives — Reverse the Diamond Model!!Threat Intelligence is cyber security’s curated view into the adversary and their capabilities. Unless the intelligence provider supports…Jan 23Jan 23
Gary KatzMeasuring Detection VolatilitySeries: Measuring the effectiveness of a detection engineering programJul 27, 2023Jul 27, 2023
Gary KatzTracking Detection DriftSeries: Measuring the effectiveness of a detection engineering programJul 19, 20233Jul 19, 20233
Gary KatzQuantifying Detection Coverage with ValidationSeries: Measuring the effectiveness of a detection engineering programJul 11, 20232Jul 11, 20232
Gary KatzDetection Engineering Metrics Building BlocksSeries: Measuring the effectiveness of a detection engineering programJun 27, 2023Jun 27, 2023
Gary KatzThe Limitations of Mean time to DetectSeries: Measuring the effectiveness of a detection engineering programJun 21, 2023Jun 21, 2023
Gary KatzThe Relationships Between Detection Engineering ParadigmsThe Pyramid of Pain, first proposed by David Bianco, provides a mechanism for evaluating detections and the cost to the attacker associated…Jan 10, 2023Jan 10, 2023
Gary KatzAchievable Software ArchitectureAs an architect, we are constantly trying to design the perfect system; something that is sustainable, meets the future requirements…May 18, 2022May 18, 2022