Cyber Defense Automation
This paper describes why cyber defense automation is needed, challenges to automating cyber defense, and strategies for overcoming these challenges.
Zero Trust Reference Architecture Operation
This paper describes a heterogeneous vendor implementation of a Zero Trust Architecture and explains it's operation.
Ed Amoroso interviews John Hayes
TAG Cyber 2020 Security Annual
San Mateo CA - Reno NV - Sarasota FL