Enterprise Cybersecurity Measurement
Enterprises can manage, mitigate and monitor their cyber risks by mapping threats and adversary tactics, techniques and procedures to known vulnerabilities. Ultimately, the goal is to have a scalable, reproducible metric for risk. On Feb. 4, 2021,…
Improving Arizona’s Elections
Seems like an easy question. Less costly and more efficient beats expensive and inefficient every day, and twice on Sundays. Arizona had one of the most successful elections of the 2020 cycle. In the face of a global pandemic and record-breaking…
Securing federal systems, revisiting Solarium recommendations among first priorities, policy pros say
Securing federal systems, revisiting Solarium recommendations among first priorities, policy pros say With the SolarWinds and Microsoft Exchange hacks framing every discussion around federal cybersecurity efforts, policy pros are offering a variety…
Security Bulletin: Cybersecurity Executive Order
Adopt threat modeling, control validation, and ATT&CK. Technology providers should anticipate being targeted by threat actors—either for financial gain or as a stepping stone into customer environments—and apply and validate security controls based…