-
Project Log: Day 17 – Crown Jewels Version
I mentioned it this morning, I could re-program my simulation-based optimization thing to aim for different objectives… And so I did. Here the results: Same visualization as the last one (left: before, right: after optimization, top: Protection, bottom: detection&cleaning). Now suppose you want to protect SPECIFICALLY say 4 nodes from infection, say your DB Servers…
-
Project Log: Day 17
It’s been a hell of a week so far. A good one. Now I have the weekend in front of me, and as I’m a bit tired, I’ll slow down a bit. Or maybe next week, instead. Regardless, I need to plan what’s next. Upcoming objectives Applicability 1: In the network security world, sometimes you…
-
Thinking about Cybersecurity Operations
Intro I’ve seen a few “SOCs” by now (not many either, just a few), and often times companies use the NIST framework to kind of organize the teams. Alright, so I have been thinking quite a bit lately on modeling such organizations. Here I’ll mention only a few ideas for now. Feedback and Influence It’s…