Archive
2020 - 2023 | 2019 - 2008 | 2003 - 2007
From the SANS Analyst Insight Blog
- Top Three COVID-Related Risks – March 31, 2020
- Humans and Technology: An Insecure Mix – March 19, 2020
- RSA: The Human Element – February 28, 2020
- Turning Out the Lights on Ransomware; Target-specific ransomware can now impact the basic systems that support our daily lives. – February 13, 2020
From SANS: Deb Radcliff's Series on Protecting Our Cyber Warriors:
- Protecting the Mental Health of Cyber Warriors – October 30, 2019
- The Dark Side of Threat Research – November 12, 2019
- When Investigations Go South – Final in the series, this one focused on legal liability – December 3, 2019
Highlights from 2022
- Deb's Framework for evaluating Cybersecurity Vendors; There are no real frameworks for evaluating cybersecurity vendors, so Deb worked with experts to help frame one. – CSO Online, November 2022
- Why CISO roles require business and technology savvy; Listening and communicating to both the technical and business sides is critical to successfully leading IT teams and business leaders to the same end-goal. – CSO Online, October 2022
- 5 ways to unite security and compliance; Which comes first, security or compliance? In an ideal world, they work together seamlessly. Here's how to achieve that. – CSO Online, August 2022
- How the US DHS develops hard-to-find cybersecurity skills; The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget. – CSO Online, July 2022
- How a new generation of IoT botnets is amplifying DDoS attacks; IoT botnets are not new. Nor are DDoS attacks. But the two are on a trajectory that is raising the stakes in DDoS protection and bot takeover prevention. – CSO Online, April 2022
- LookLeft: Cybercrime Stories Told from an Investigative Journalist's POV:
Highlights from 2021
- Taxonomy of SUNBURST Attack's DNS Abuse Tactics – Whitepaper by Deb Radcliff, March 2021
- APTs, Zero Days, and Supply Chain Attacks – Whitepaper by Deb Radcliff, March 2021
- 3 best practices to protect sensitive data in the cloud; Follow these three essential best practices to protect customer or proprietary data in cloud apps and infrastructure. – CSO Online, March 2021
- CISO job search: What to look (and look out) for; Sometimes a CISO isn't really a CISO, or the role does not have the authority or resources it needs. Here's how those seeking CISO roles can avoid the wrong employer. – CSO Online, March 2021
Highlights from 2020
- Privacy, data protection regulations clamp down on biometrics use; The highly sensitive nature of biometric data and new regulations aimed to protect it are cause to rethink how it's used for authentication. – CSO Online, December 2020
- Avoiding the snags and snares in data breach reporting: What CISOs need to know; Ambiguities in a growing list of US reporting requirements keep CISOs up at night: Will they be compelled to report every breach even if they can prove the data was untouched? Experts advise on how to avoid trouble. – CSO Online, October 2020
Go back further in the Archive »