Skip to content

Cyber Security

  • About
  • Books
  • Global Threats Research
    • US
    • Russia
    • China
    • Iran
    • North Korea
  • Disclaimer

Category: Robert Lentz

Cyber Economics (2) – Deployment of advanced targeted security controls with Threat Modelling and Cyber Insurance

In my previous post, I went through the need and benefits of deploying a security control baseline according to the framework researched. Two of the most important ideas extracted from the first post are: Implementing a security control baseline to address low to moderate threat sophistication is essential and economically beneficial, because it will target…

Read More

Translate

Follow me on Twitter

My Tweets

Top Posts & Pages

  • Network Forensics - Traffic Analysis (2)
  • Bypassing Perimeter Security and Malware Evasion (3)
  • Network Forensics - Traffic Analysis (1)
  • Enterprise Threat Modeling and ATT&CK
  • Defensible architectures
  • Cyber Threat Hunting (1): Intro
  • Book review: Leading change, our iceberg is melting
  • Memory Forensics with Vshot and Remnux (code injection, 4)
  • Bypassing Perimeter Security and Malware Evasion (1)
  • The top 10 windows logs event's used to catch hackers

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 46 other followers

Archives

Follow on WordPress.com
Create a free website or blog at WordPress.com.
Cancel

 
Loading Comments...
Comment
    ×
    Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
    To find out more, including how to control cookies, see here: Cookie Policy