by Paul Rosenzweig | Mar 25, 2021 | Cybersecurity, National Security
Enterprises can manage, mitigate and monitor their cyber risks by mapping threats and adversary tactics, techniques and procedures to known vulnerabilities. Ultimately, the goal is to have a scalable, reproducible metric for risk. On Feb. 4, 2021,…
by Paul Rosenzweig | Mar 16, 2021 | Cybersecurity
Seems like an easy question. Less costly and more efficient beats expensive and inefficient every day, and twice on Sundays. Arizona had one of the most successful elections of the 2020 cycle. In the face of a global pandemic and record-breaking…
by Paul Rosenzweig | Mar 15, 2021 | Cybersecurity
Securing federal systems, revisiting Solarium recommendations among first priorities, policy pros say With the SolarWinds and Microsoft Exchange hacks framing every discussion around federal cybersecurity efforts, policy pros are offering a variety…
by Paul Rosenzweig | Mar 13, 2021 | Cybersecurity
Adopt threat modeling, control validation, and ATT&CK. Technology providers should anticipate being targeted by threat actors—either for financial gain or as a stepping stone into customer environments—and apply and validate security controls based…
by Paul Rosenzweig | Feb 23, 2021 | Cybersecurity, Homeland Security
Rosenzweig is the founder of Red Branch Consulting PLLC, a homeland security consulting company, and a senior fellow at the R Street Institute. He is also a senior adviser to The Chertoff Group. He formerly served as deputy assistant secretary for…
by Tonya Riley | Feb 5, 2021 | Cybersecurity, National Security
with Aaron Schaffer Coronavirus has brought more scams than any event in the last decade. Lawmakers and advocates are proposing a way for the government to protect Americans: Giving everyone a digital ID that could prove they’re really who they say…