Juan Pablo CastroHarmonizing Cyber Resilience: How DORA, NIS2, and NIST CSF 2.0Regulations such as the Digital Operational Resilience Act (DORA) and the Network and Information Systems Directive 2 (NIS2) play a crucial…Mar 16
Rona Michele SpiegelA Proper Dose of Risk Management when Adopting New TechnologiesLeaders increasingly experience pressure to adopt new technology. Cyber Risk Management practices need not squelch productivity.Apr 29Apr 29
Laura VoicuinThe Deep HubSecurity Through the Lens of Statistical Distributions: Understanding the Poisson Distribution and…A Long Winded IntroductionFeb 161Feb 161
wanodya einNerd For TechIcarus Falls: An Approach to Cyber Risk Management in the Aviation IndustryMy dad was the one who got me into books and stories. I remember when I was 7; he gave me a book about Greek Mythology instead of the…Apr 13Apr 13
Juan Pablo CastroHarmonizing Cyber Resilience: How DORA, NIS2, and NIST CSF 2.0Regulations such as the Digital Operational Resilience Act (DORA) and the Network and Information Systems Directive 2 (NIS2) play a crucial…Mar 16
Rona Michele SpiegelA Proper Dose of Risk Management when Adopting New TechnologiesLeaders increasingly experience pressure to adopt new technology. Cyber Risk Management practices need not squelch productivity.Apr 29
Laura VoicuinThe Deep HubSecurity Through the Lens of Statistical Distributions: Understanding the Poisson Distribution and…A Long Winded IntroductionFeb 161
wanodya einNerd For TechIcarus Falls: An Approach to Cyber Risk Management in the Aviation IndustryMy dad was the one who got me into books and stories. I remember when I was 7; he gave me a book about Greek Mythology instead of the…Apr 13
Juan Pablo CastroThe Power of Risk-Based Vulnerability ManagementIn the challenging landscape of cybersecurity, staying ahead of potential threats is not just a strategy; it’s a necessity. One approach…Feb 18
Laura VoicuSecurity Through the Lens of Statistical Distributions: Understanding the Beta Distribution and its…This article is a continuation of the series of articles on “Security Through the Lens of Statistical Distributions”. If you’ve missed the…Mar 162
joshuanataninSystem WeaknessIncident Detection and ResponseAs a cyber consultant that has never been in a security operational team, I find it really difficult to understand how these processes…Jun 1, 2023