<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Network Situational Awareness</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Network Situational Awareness</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/network-situational-awareness/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 08 Feb 2021 00:00:00 -0500</lastBuildDate><item><title>How Situational Awareness Informs Cybersecurity Operations</title><link>https://www.sei.cmu.edu/blog/how-situational-awareness-informs-cybersecurity-operations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Situational awareness (SA) helps decision makers throughout an organization have the information and understanding they need to make sound decisions about cybersecurity operations. In this blog post, I review and provide examples of how to use SA in cybersecurity operations.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nathaniel Richmond</dc:creator><pubDate>Mon, 08 Feb 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/how-situational-awareness-informs-cybersecurity-operations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category></item><item><title>Pandemic Home Security for Your Enterprise</title><link>https://www.sei.cmu.edu/blog/pandemic-home-security-for-your-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The COVID-19 pandemic has greatly increased remote work among enterprise employees. Home-network environments are not professionally managed, so they are an appealing target for attackers. In this post, we advise how to mitigate these risks to regain a security footing.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce, Harry Caskey</dc:creator><pubDate>Mon, 25 Jan 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/pandemic-home-security-for-your-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Best Practices in Network Security</category></item><item><title>Remote Work: Vulnerabilities and Threats to the Enterprise</title><link>https://www.sei.cmu.edu/blog/remote-work-vulnerabilities-and-threats-to-the-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>How has this change in the way we work altered our security posture? How has it changed our attack surface, and what should we be doing to defend it? In this blog post, I explore the answers to these questions.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce</dc:creator><pubDate>Mon, 18 Jan 2021 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/remote-work-vulnerabilities-and-threats-to-the-enterprise/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Best Practices in Network Security</category></item><item><title>Is Your Organization Using Cybersecurity Analysis Effectively?</title><link>https://www.sei.cmu.edu/blog/is-your-organization-using-cybersecurity-analysis-effectively/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post explores how organizations can effectively use cybersecurity analysis and discusses the importance of an effective incident response plan.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Mon, 31 Aug 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/is-your-organization-using-cybersecurity-analysis-effectively/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cybersecurity</category></item><item><title>Situational Awareness for Cybersecurity Architecture: 5 Recommendations</title><link>https://www.sei.cmu.edu/blog/situational-awareness-cybersecurity-architecture-5-recommendations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post on situational awareness for cybersecurity, we present five recommendations for the practice of architecture in the service of cybersecurity situational awareness (SA)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce</dc:creator><pubDate>Mon, 13 Jul 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-cybersecurity-architecture-5-recommendations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Situational Awareness for Cyber Security Architecture: Tools for Monitoring and Response</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cyber-security-architecture-tools-for-monitoring-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Visibility into the activities within assets enables network security analysts to detect network compromises. Analysts monitor these activities directly on the device....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Shimeall</dc:creator><pubDate>Mon, 11 May 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cyber-security-architecture-tools-for-monitoring-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Situational Awareness for Cybersecurity Architecture: Network Visibility</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-architecture-network-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Network compromises cannot be detected without visibility into the activities within assets. Network security analysts can view these activities in one of two places....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timur Snoke</dc:creator><pubDate>Mon, 23 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-architecture-network-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Engineering for Cyber Situational Awareness: Endpoint Visibility</title><link>https://www.sei.cmu.edu/blog/engineering-for-cyber-situational-awareness-endpoint-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post, we aim to help network security analysts understand the components of a cybersecurity architecture, starting with how we can use endpoint information....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce, Timur Snoke</dc:creator><pubDate>Mon, 10 Feb 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/engineering-for-cyber-situational-awareness-endpoint-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Situational Awareness for Cybersecurity: Three Key Principles of Effective Policies and Controls</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-three-key-principles-of-effective-policies-and-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Security measures are most effective when it is clear how assets are supposed to be used and by whom....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Mon, 18 Nov 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-three-key-principles-of-effective-policies-and-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Situational Awareness</category><category>Network Situational Awareness</category></item><item><title>Situational Awareness for Cybersecurity: Assets and Risk</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-assets-and-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>When key business assets are not adequately protected from cybersecurity breaches, organizations can experience dire consequences....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman, Lauren Cooper</dc:creator><pubDate>Wed, 16 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-assets-and-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Managing the Risks of Ransomware</title><link>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Ransomware poses a growing threat to both businesses and government agencies. Though no strategy can fully eliminate these risks, this post provides recommendations....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Tobar, Jason Fricke</dc:creator><pubDate>Fri, 11 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Situational Awareness</category></item><item><title>Situational Awareness for Cybersecurity: An Introduction</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-an-introduction/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Situational awareness (SA) helps decision makers throughout an organization have the information and understanding available to make good decisions in the course of their work....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Mon, 09 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-an-introduction/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Evaluating Threat-Modeling Methods for Cyber-Physical Systems</title><link>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Addressing cybersecurity for a complex system, especially for a cyber-physical system of systems (CPSoS), requires a strategic approach during the entire lifecycle of the system....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 04 Feb 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/evaluating-threat-modeling-methods-for-cyber-physical-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Threat Modeling: 12 Available Methods</title><link>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Almost all software systems today face a variety of threats, and the number of threats grows as technology changes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Nataliya Shevchenko</dc:creator><pubDate>Mon, 03 Dec 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/threat-modeling-12-available-methods/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Security-Related Requirements</category><category>OCTAVE</category><category>Cyber Risk and Resilience Management</category><category>Network Situational Awareness</category><category>Enterprise Risk and Resilience Management</category><category>Cyber Missions</category><category>Threat Modeling </category><category>Best Practices in Network Security</category><category>Risk</category><category>Cyber-Physical Systems</category><category>Critical Infrastructure Protection</category></item><item><title>Cache Poisoning of Mail Handling Domains Revisited</title><link>https://www.sei.cmu.edu/blog/cache-poisoning-of-mail-handling-domains-revisited/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In 2014 we investigated cache poisoning and found some in some damaging places, like mail-handling domains.  It can't be assumed behaviors on the internet continue unchanged....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf</dc:creator><pubDate>Wed, 20 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cache-poisoning-of-mail-handling-domains-revisited/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>12 Risks, Threats, &amp; Vulnerabilities in Moving to the Cloud</title><link>https://www.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-to-the-cloud/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Organizations continue to develop new applications in or migrate existing applications to cloud-based services. The federal government recently made cloud-adoption a central tenet of its IT modernization strategy....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Morrow</dc:creator><pubDate>Mon, 05 Mar 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-to-the-cloud/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Best Practices in Network Security</category><category>Cloud Computing</category><category>Situational Awareness</category></item><item><title>Declaring War on Cyber Terrorism...or Something Like That</title><link>https://www.sei.cmu.edu/blog/declaring-war-on-cyber-terrorismor-something-like-that/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Buzzwords are a mainstay in our field, and "cyberterrorism" currently is one of the hottest.  But how does the definition of "terrorism" change when adding the complexities of the Internet? What does the term "cyber terrorism" actually mean?</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf, Deana Shick, Eric Hatleback</dc:creator><pubDate>Thu, 01 Feb 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/declaring-war-on-cyber-terrorismor-something-like-that/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Situational Awareness</category><category>Network Situational Awareness</category><category>Cyber Missions</category><category>CERT/CC</category></item><item><title>Improving Data Extraction from Cybersecurity Incident Reports</title><link>https://www.sei.cmu.edu/blog/improving-data-extraction-from-cybersecurity-incident-reports/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post is the first in a series on improving useful data extraction from cybersecurity incident reports, focusing on work done by the SEI and US-CERT.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Samuel Perl</dc:creator><pubDate>Fri, 29 Sep 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/improving-data-extraction-from-cybersecurity-incident-reports/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cyber Missions</category><category>Situational Awareness</category></item><item><title>Ransomware: Best Practices for Prevention and Response</title><link>https://www.sei.cmu.edu/blog/ransomware-best-practices-for-prevention-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>On May 12, 2017, in the course of a day, the WannaCry ransomware attack infected nearly a quarter million computers. WannaCry is the latest in....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexander Volynkin, Angela Horneman, José Morales</dc:creator><pubDate>Wed, 31 May 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ransomware-best-practices-for-prevention-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cyber Missions</category><category>Network Situational Awareness</category><category>Ransomware</category><category>Situational Awareness</category></item><item><title>Best Practices for Network Border Protection</title><link>https://www.sei.cmu.edu/blog/best-practices-for-network-border-protection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>When it comes to network traffic, it's important to establish a filtering process that identifies and blocks potential cyberattacks...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rachel Kartch</dc:creator><pubDate>Mon, 15 May 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/best-practices-for-network-border-protection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cyber Missions</category><category>Network Situational Awareness</category><category>Situational Awareness</category></item></channel></rss>