Improving Detection and Response: Making the Case for Deceptions

Let’s face it, most enterprises find it incredibly difficult to detect and remove attackers once they’ve taken over user credentials, exploited hosts or both. In the meantime, attackers are working on their next moves. That means data gets stolen and Read More …

The Building Resilience to Cognitive Warfare Technical Exchange Meeting

In September 2023, MITRE hosted a Technical Exchange Meeting (TEM) titled Building Resilience to Cognitive Warfare with participants from MITRE, the Department of Defense, and the Australian Defense Force, whic h focused on securing the cognitive domain, including identifying national-level Read More …

UK: Met Police is planning to root out corruption with use of ‘sophisticated’ new technology that monitors officers’ phones and computers

The Met Police will root out rogue officers with ‘sophisticated’ new technology that can monitor officers’ emails and work phones for ‘alarming’ words in a bid to stamp out its culture of sexism and racism. The software will also track Read More …

UK MoD data strategy calls for social media surveillance on behalf of ‘local authorities’

The Ministry of Defence has published a data strategy that calls on the British armed forces to make better use of its “enduring strategic asset” – by spying on social media and dobbing in dissenters to local councils. In a Read More …

Behavioral biometrics missing from cybersecurity

Recently, there’s been an uptick in the adoption of the NIST Cybersecurity Framework, a set of guidelines aimed at helping organizations improve their overall cybersecurity process. In December 2017, NIST released the second draft of its framework. Among the updates were two Read More …