Information Security Analytics Blog
Saturday, August 28, 2021
Common Attack Graph Schema (CAGS) 3.2
›
It's been a while since I've updated CAGS. This is an initial post and may be modified to better fit with CAGS 2 later. Revision: ...
11 comments:
Wednesday, February 3, 2021
Can you predict the future? No.
›
Did you ever wonder why some people succeed and others don't? Why Jeff Bezos is rich? Why a company got breached? Is it because Jeff Be...
10 comments:
Monday, February 1, 2021
Simulating Security Strategy
›
You’ve probably imagined it, right? Lots of little attackers and defenders going at it in a simulated environment while you look on with gl...
11 comments:
Sunday, June 9, 2019
Be the CFP review you want to be reviewed by
›
There are lots of infosec conferences which means lots of CFPs and lots of talks reviewed. I participate in several and figured I would shar...
8 comments:
Friday, September 7, 2018
Data Driven Security Strategy
›
I presented on building a data driven security strategy at RSA this year. You can find the video here and the slides here . If there...
115 comments:
Data Analysis Template
›
This is just a quick blog to share my jupyter notebook analysis template . I analyze a lot of different datasets in a short period, so havi...
17 comments:
Sunday, August 19, 2018
Game Analysis of the 2018 Pros vs Joes CTF at BSidesLV
›
Introduction Capture the Flag (CTF) contests are a staple of security conferences and BSides Las Vegas is no exception. However the P...
11 comments:
›
Home
View web version