Skip to Content

agoge.io

Latest Posts

A Roadmap for Getting Hired in Cybersecurity

A Roadmap for Getting Hired in Cybersecurity

Forward:  I've seen many articles on breaking into the cybersecurity field from bloggers, journalists, and content creators, but I have yet to hear from hiring managers. This article seeks to change that.

 

Introduction to the Cybersecurity Job Market

 

Critical energy pipelines have shut down, stopping the essential flow of fuel. Distressed hospitals are forced to turn away patients from Emergency Rooms. Production on manufacturing lines has come to a halt. In all cases, people are scrambling about responding in panic. These aren't the scenes from an apocalyptic movie; they are real scenarios that play out daily

A Roadmap for Getting Hired in Cybersecurity Read more

What are CIS Controls

What are CIS Controls
Security Operations Monitoring their Network for Threats.

Organizations throughout the globe are looking for ways to secure their networks from cyber-attacks.  One of the ways that organizations accomplish this objective is by leveraging security controls.  While many regulatory frameworks such as NIST, ISO 2700x, and HIPAA provide control objectives, they frequently need more details to implement those controls effectively.  This is where the CIS Controls come into play.  This article will give you an understanding of CIS Controls, their sub-components, how they are used, how they compare to other common frameworks such as NIST or HIPAA, and how they have evolved over time.

What are CIS Controls Read more

What is the MITRE ATT&CK Framework?

What is the MITRE ATT&CK Framework?

Understanding cyber threats requires more than knowing the latest tech terms; it demands a deep understanding of cyber attackers' tactics, techniques, and procedures. Understanding cyber attackers' tactics is where the MITRE ATT&CK Framework proves invaluable. It's a comprehensive guide that outlines the behavior of cyber adversaries across multiple platforms, including Windows, Linux, macOS, mobile, and cloud systems. The Framework doesn't just list attacks; it provides a detailed glimpse at how attackers execute cyber attacks, offering insights into the entire lifecycle of cyber threats.

The MITRE ATT&CK Framework is essential for cybersecurity activities like adversary emulation, red

What is the MITRE ATT&CK Framework? Read more

What is Vulnerability Management?

What is Vulnerability Management?
A man looking at a brain

Introduction:

Vulnerability management is a critical cybersecurity program that most organizations struggle with. The Ponemon Institute conducted a study that found 56% of cyber-attack victims were breached due to an unpatched vulnerability. Forty percent of the victims knew they were vulnerable before being compromised. This blog series will provide the information needed to build a world-class vulnerability program. Whether you're managing an existing vulnerability program and want to improve its quality and efficiency, or you're new to cybersecurity. You are trying to gain the skills to land a job. This series covers everything from cyber risk and how it should

What is Vulnerability Management? Read more

What is MITRE

What is MITRE

What is MITRE?

 

Today, we dive into the importance of MITRE.org for cybersecurity professionals. Understanding the tools and frameworks that MITRE has developed is crucial to preparing for a job in cybersecurity. MITRE is known for producing key frameworks and methodologies, Common Vulnerabilities and Exposures (CVEs), the MITRE ATT&CK framework, and more. MITRE's contributions in standardizing best practices and setting industry benchmarks have been critical for cybersecurity. Their insights into threat intelligence are pivotal for staying up to date on emerging threat vectors and attack methodologies. As we explore MITRE's role in cybersecurity, you will discover

What is MITRE Read more

Why the NIST AI RMF Wont Help

Why the NIST AI RMF Wont Help
Baby trying to eat a stake

If you try to feed a baby a T-bone steak, it will die of starvation.

Steven Aiello

 

 

It's a simple concept I reinforce to my team. In the consulting field, you must meet your customers where they are. A lot of time and energy has been put into the NIST AI Risk Management Framework (RMF). But with all this time and energy, did the NIST AI Risk Management Framework meet customers where they were? No, the NIST AI Risk Management Framework alone won't help most companies meaningfully improve their AI governance programs. However, I'm only particularly eager to

Why the NIST AI RMF Wont Help Read more