Information Security Analytics Blog

By applying science to security we help our partners build their security programs based on facts rather than feelings. Follow our blog for the latest case studies and projects.

post-thumb
June 20, 2015

Diminishing Returns on Mitigations

This was originally posted on blogger here. So now that I have the DBIR Attack Graph, I wanted to test something out.  How does the shortest attack path from start to end change when you mitigate things in the graph? ...

read more
post-thumb
June 15, 2015

Privacy was a Passing Fad

This was originally posted on blogger here. The breach of OPM has a lot of people angry and scared about their privacy.  That's not surprising.  The federal government keeps a lot of information on its employees. ...

read more
post-thumb
June 8, 2015

The DBIR Attack Graph Web App

This was originally posted on blogger here. It's time to shake up how we think of risk.  To that end, I've published the DBIR Attack Graph Web App at http://dbir-attack-graph. ...

read more
post-thumb
June 2, 2015

The Other DBIR: Database Breach Investigations Report

This was originally posted on blogger here. Wondering how databases are represented in the Verizon Data Breach Investigations Report?  Head on over to the Verizon security blog and check out my new blog post answering just that! ...

read more

LET’S WORK TOGETHER