Information Security Analytics Blog

Saturday, August 28, 2021

Common Attack Graph Schema (CAGS) 3.2

›
 It's been a while since I've updated CAGS. This is an initial post and may be modified to better fit with CAGS 2 later. Revision: ...
11 comments:
Wednesday, February 3, 2021

Can you predict the future? No.

›
Did you ever wonder why some people succeed and others don't? Why Jeff Bezos is rich? Why a company got breached?  Is it because Jeff Be...
10 comments:
Monday, February 1, 2021

Simulating Security Strategy

›
You’ve probably imagined it, right? Lots of little attackers and defenders going at it in a simulated environment while you look on with gl...
11 comments:
Sunday, June 9, 2019

Be the CFP review you want to be reviewed by

›
There are lots of infosec conferences which means lots of CFPs and lots of talks reviewed. I participate in several and figured I would shar...
8 comments:
Friday, September 7, 2018

Data Driven Security Strategy

›
I presented on building a data driven security strategy at RSA this year.  You can find the video here and the slides here . If there...
115 comments:

Data Analysis Template

›
This is just a quick blog to share my jupyter notebook analysis template .  I analyze a lot of different datasets in a short period, so havi...
17 comments:
Sunday, August 19, 2018

Game Analysis of the 2018 Pros vs Joes CTF at BSidesLV

›
Introduction Capture the Flag (CTF) contests are a staple of security conferences and  BSides Las Vegas  is no exception.  However the  P...
11 comments:
›
Home
View web version

About Me

Gabe
View my complete profile
Powered by Blogger.