From the Fall 2022 Issue

AI-Enabled Cyber Operations

Author(s):

Dr. Scott Jasper, Senior Lecturer, Captain, U.S. Navy, Retired, Naval Postgraduate School

AI-Enabled Cyber Operations

Strategists Daniel Araya and Rodrigo Nieto-Gomez proclaim that Artificial Intelligence (AI) has evolved into a “powerful driver of social transformation,” manifested by Machine Learning (ML) in a wide range of mainstream commercial applications.[1]  As renown entrepreneur Steve Blank explains, AI solves problems, makes decisions, and performs tasks that “traditionally require humans to do.”[2]  ML is … Read more

From the Fall 2021 Issue

Biden Orders Endpoint Detection and Response (EDR) Initiative

Author(s):

Dr. Scott Jasper, Senior Lecturer, Captain, U.S. Navy, Retired, Naval Postgraduate School

Biden Order EDR

President Biden signed an Executive Order in May 2021 to improve the Nation’s cybersecurity.  It claims the United States “faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector [and] the private sector.”  The Executive Order was released only months after the SolarWinds Supply Chain campaign was revealed by the cybersecurity firm, … Read more

From the Fall 2020 Issue

Data Correlation for National Resilience

Author(s):

Dr. Scott Jasper, Senior Lecturer, Captain, U.S. Navy, Retired, Naval Postgraduate School

Data Correlation for National Resilience

A pillar of the March 2020 Cyberspace Solarium Commission report is to promote national resilience to deny adversaries the benefit of their cyber operations.[1]  This ambition is consistent with the Department of Homeland Security’s vision to increase security and resilience across government networks and critical infrastructure.[2]  While the term security means the capacity to prevent … Read more

From the Winter 2018 Issue

Implementing Automated Cyber Defense

Author(s):

Dr. Scott Jasper, Senior Lecturer, Captain, U.S. Navy, Retired, Naval Postgraduate School

Automated Cyber Defense image

Today, massive numbers of uncorrelated and unprioritized alerts overwhelm network security operations. Staff are unable to respond to breaches anywhere near real-time. Legacy architectures layer “best of breed” components for firewall, intrusion protection, web content filtering and antivirus protection, each of which generates a unique set of alerts. Additional devices only contribute to an ever … Read more