Part I - Enabling True Risk Ownership
Part I - Enabling True Risk Ownership Blog Series - Clearing Obstacles to Risk Accountability This blog series is a four …
Hard Truths About Vulnerability Management
During the Harden phase of the Harden, Detect, and Respond process, a company focuses on finding weaknesses in its syste …
Managing Risk for AI Systems and Applications
Artificial Intelligence systems like GenAI have a massive opportunity to improve the overall quality of human life, but …
Managing AI Expectations Through the lens of Cybersecurity Trust Modeling
How much did you trust Clippy? Remember the generative LLM-based support assistant AI chatbot for Microsoft Office? That …
10 Things SMBs Need to Know about the State of Cybersecurity in the DIB
There's innovative work being accomplished by small and medium-sized businesses today serving our Defense Industrial Bas …
Narrowing Focus in Forensic Investigation
An incident responder is a storyteller. We tell the story of an attack sequence by gradually uncovering artifacts and in …
RADICL Unveiled
In the spring of 2021, Matt, Dave, and I kicked off RADICL with the fundamental goal of building a better future when it …
Why RADICL
Off the Sidelines, back to the Fight I am an American Patriot. Regardless of our imperfections, I believe no country in …