Katlyn GalloFive Ways to Combat Alert Fatigue in Your Security ProgramStrategies to help you continuously reduce alerts, identify opportunities for improvement, and avoid alert fatigue.Aug 15, 2022Aug 15, 2022
Katlyn GalloIntegrating Threat Intelligence & ATT&CK Into a Security ProgramHow can companies use threat intelligence and the ATT&CK framework to make their security programs more effective?Jul 19, 2022Jul 19, 2022
Katlyn GalloLevel Up Your Cybersecurity Operations With Threat-Informed DefenseWhat is threat-informed defense & how can I adopt it in my organization?Jul 15, 20221Jul 15, 20221
Katlyn GalloKey Components of an Effective Security ProgramWhat makes a successful information security program?Jun 9, 2022Jun 9, 2022
Katlyn GalloAnalyzing ATT&CK Matrix Gaps & Proposing MitigationsCybersecurity Capstone — Part FourApr 5, 2022Apr 5, 2022
not your CISOCybersecurity in 2022: What to Focus onI have been facing the writer’s block for quite a long time now. I was confused about what to write. There are so many things to write…Mar 13, 20221Mar 13, 20221
Katlyn GalloPrioritizing Threat Actors Using Recorded FutureCybersecurity Capstone — Part OneFeb 15, 2022Feb 15, 2022
Kamyar KojouriLight Roast 111: XDR — Hype vs. RealityA brief overview of security controls for endpoints and infrastructure, and a comparison between SIEM and XDR technologies.Feb 2, 2022Feb 2, 2022
:/JennThreat Modeling — The Short VersionThreat Modeling is the structured practice of identifying and prioritizing potential threats and vulnerabilities, and the prioritization…Jan 28, 20225Jan 28, 20225
Ronald GassanTrends Shaping CybersecurityCybersecurity is now a priority in business. As time goes on, cyberattacks are growing in scale and sophistication, and every new…Oct 27, 2021Oct 27, 2021