Currently different reference models are used to manage cybersecurity, although practically none are applicable “as is” to lower levels as they do not detail specific procedural aspects …
Featured Application This study holds direct applicability for organizations seeking to establish comprehensive, tactical, and operational cybersecurity management, especially …
A Salman, S Creese… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
This position paper proposes the use of Large Language Models (LLMs) to evaluate the compliance of cybersecurity controls with organisational policies. We high-light the …
Proper security control enforcement reduces the attack surface and protects the organizations against attacks. Organizations like NIST and CIS (Center for Internet Security) …
The unprecedented increase in the number and sophistication of cyber-attacks (eg, advanced persistent threats or APTs) has called for effective and efficient threat-hunting …
Abstract Through the Cybersecurity Information Sharing Act of 2015, a DHS information- sharing program was mandated to protect US businesses and critical infrastructure and …