[HTML][HTML] Humans and automation: Augmenting security operation centers
J Tilbury, S Flowerday - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
The continuous integration of automated tools into security operation centers (SOCs)
increases the volume of alerts for security analysts. This amplifies the risk of automation bias …
increases the volume of alerts for security analysts. This amplifies the risk of automation bias …
[HTML][HTML] Minimizing incident response time in real-world scenarios using quantum computing
Abstract The Information Security Management Systems (ISMS) are global and risk-driven
processes that allow companies to develop their cybersecurity strategy by defining security …
processes that allow companies to develop their cybersecurity strategy by defining security …
Managing the Inevitable–A Maturity Model to Establish Incident Response Management Capabilities
M Bitzer, B Häckel, D Leuthe, J Ott, B Stahl… - Computers & Security, 2023 - Elsevier
Although the ongoing digital transformation offers new opportunities for organizations, more
emphasis on information security is needed due to the evolving cyber-threat landscape …
emphasis on information security is needed due to the evolving cyber-threat landscape …
[HTML][HTML] The tensions of cyber-resilience: From sensemaking to practice
The growing sophistication, frequency and severity of cyberattacks targeting all sectors
highlight their inevitability and the impossibility of completely protecting the integrity of …
highlight their inevitability and the impossibility of completely protecting the integrity of …
[HTML][HTML] Operations-informed incident response playbooks
Cyber security incident response playbooks are critical for establishing an effective incident
response capability within organizations. We identify a significant conceptual gap in the …
response capability within organizations. We identify a significant conceptual gap in the …
Enhancing cybersecurity capability investments: Evidence from an experiment
In recent years, investments in cybersecurity capabilities (CC) have emerged as an essential
practice in reducing cyberattacks and optimizing the usage of technologies. Therefore …
practice in reducing cyberattacks and optimizing the usage of technologies. Therefore …
[HTML][HTML] Automation Bias and Complacency in Security Operation Centers
J Tilbury, S Flowerday - Computers, 2024 - mdpi.com
The volume and complexity of alerts that security operation center (SOC) analysts must
manage necessitate automation. Increased automation in SOCs amplifies the risk of …
manage necessitate automation. Increased automation in SOCs amplifies the risk of …
Model of information system communication in aggressive cyberspace: reliability, functional safety, economics
The manuscript presents a mathematical apparatus for modeling the process of operation of
the information system in the conditions of aggressive cyberspace, for which the …
the information system in the conditions of aggressive cyberspace, for which the …
Large language models present new questions for decision support
Large language models (LLMs) have proven capable of assisting with many aspects of
organizational decision making, such as helping to collect information from databases and …
organizational decision making, such as helping to collect information from databases and …
Sociotechnical design of building energy management systems in the public sector: Five design principles
Advocacy for energy efficiency solutions in non-residential buildings, particularly within the
public sector, is part of the response to the climate crisis by the European Union (EU) …
public sector, is part of the response to the climate crisis by the European Union (EU) …