Articles

Welcome to our articles page. You will find articles on various aspects of Information Security and Business Continuity promulgated here. This is done on an ongoing basis for free of cost for your education. We emphasize your cooperation to refrain from redistributing our content for commercial purposes without our prior written consent. However, you are free to use it for your personal (educational and research) purposes or to implement a certain roadmap or strategy in your organization.

 

We partner with CyAlpha — a Calgary-based Cyber consulting firm, to offer you the above services.


SDAR: Core Series, Core Series Rhonald John Rose SDAR: Core Series, Core Series Rhonald John Rose

Security Data Analytics and Reporting: Stakeholders

The first step a business must take when implementing SDAR is to identify who its stakeholders are. Next, the business should analyze their stakeholders’ high level requirements, technology domains and viewpoints. Finally, the business can tie all this together and implement SDAR.

This article will explore the different types of stakeholders an organization can have and their respective responsibilities.

Read More
SDAR: Companion Series 1 Rhonald John Rose SDAR: Companion Series 1 Rhonald John Rose

SIEM, SOAR and SDAR

This article will give you a high-level overview of the different terminologies and overlapping features of some common IT tools. You’ll also learn, in detail, about SIEM software and its use cases. Please refer to the glossary page for all the acronyms and definitions used in this article.

Read More