From Reactive Security to Threat-Informed Defense: My Research Journey on Risk-Based Cybersecurity Prioritisation

After months of research, adversary emulation, lab building, testing, and validation, I’m pleased to share that my cybersecurity research paper, “A Risk-Based Framework for Prioritising Cybersecurity Controls Using MITRE ATT&CK with Empirical Validation via Adversary Emulation,” has now been published on ResearchGate and Zenodo. This research was driven by a simple but important question: Are... Continue Reading →

Blog at WordPress.com.

Up ↑