<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Situational Awareness</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Situational Awareness</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/situational-awareness/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 13 Jul 2020 00:00:00 -0400</lastBuildDate><item><title>Situational Awareness for Cybersecurity Architecture: 5 Recommendations</title><link>https://www.sei.cmu.edu/blog/situational-awareness-cybersecurity-architecture-5-recommendations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post on situational awareness for cybersecurity, we present five recommendations for the practice of architecture in the service of cybersecurity situational awareness (SA)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce</dc:creator><pubDate>Mon, 13 Jul 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-cybersecurity-architecture-5-recommendations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Situational Awareness for Cyber Security Architecture: Tools for Monitoring and Response</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cyber-security-architecture-tools-for-monitoring-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Visibility into the activities within assets enables network security analysts to detect network compromises. Analysts monitor these activities directly on the device....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Shimeall</dc:creator><pubDate>Mon, 11 May 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cyber-security-architecture-tools-for-monitoring-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Situational Awareness for Cybersecurity Architecture: Network Visibility</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-architecture-network-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Network compromises cannot be detected without visibility into the activities within assets. Network security analysts can view these activities in one of two places....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timur Snoke</dc:creator><pubDate>Mon, 23 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-architecture-network-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Engineering for Cyber Situational Awareness: Endpoint Visibility</title><link>https://www.sei.cmu.edu/blog/engineering-for-cyber-situational-awareness-endpoint-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In this post, we aim to help network security analysts understand the components of a cybersecurity architecture, starting with how we can use endpoint information....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Phil Groce, Timur Snoke</dc:creator><pubDate>Mon, 10 Feb 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/engineering-for-cyber-situational-awareness-endpoint-visibility/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Situational Awareness for Cybersecurity: Three Key Principles of Effective Policies and Controls</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-three-key-principles-of-effective-policies-and-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Security measures are most effective when it is clear how assets are supposed to be used and by whom....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Mon, 18 Nov 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-three-key-principles-of-effective-policies-and-controls/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Situational Awareness</category><category>Network Situational Awareness</category></item><item><title>Situational Awareness for Cybersecurity: Assets and Risk</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-assets-and-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>When key business assets are not adequately protected from cybersecurity breaches, organizations can experience dire consequences....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman, Lauren Cooper</dc:creator><pubDate>Wed, 16 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-assets-and-risk/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Managing the Risks of Ransomware</title><link>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Ransomware poses a growing threat to both businesses and government agencies. Though no strategy can fully eliminate these risks, this post provides recommendations....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">David Tobar, Jason Fricke</dc:creator><pubDate>Fri, 11 Oct 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/managing-the-risks-of-ransomware/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Situational Awareness</category></item><item><title>Situational Awareness for Cybersecurity: An Introduction</title><link>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-an-introduction/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Situational awareness (SA) helps decision makers throughout an organization have the information and understanding available to make good decisions in the course of their work....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Mon, 09 Sep 2019 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/situational-awareness-for-cybersecurity-an-introduction/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Cache Poisoning of Mail Handling Domains Revisited</title><link>https://www.sei.cmu.edu/blog/cache-poisoning-of-mail-handling-domains-revisited/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>In 2014 we investigated cache poisoning and found some in some damaging places, like mail-handling domains.  It can't be assumed behaviors on the internet continue unchanged....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf</dc:creator><pubDate>Wed, 20 Jun 2018 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/cache-poisoning-of-mail-handling-domains-revisited/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>12 Risks, Threats, &amp; Vulnerabilities in Moving to the Cloud</title><link>https://www.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-to-the-cloud/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Organizations continue to develop new applications in or migrate existing applications to cloud-based services. The federal government recently made cloud-adoption a central tenet of its IT modernization strategy....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timothy Morrow</dc:creator><pubDate>Mon, 05 Mar 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/12-risks-threats-vulnerabilities-in-moving-to-the-cloud/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Best Practices in Network Security</category><category>Cloud Computing</category><category>Situational Awareness</category></item><item><title>Declaring War on Cyber Terrorism...or Something Like That</title><link>https://www.sei.cmu.edu/blog/declaring-war-on-cyber-terrorismor-something-like-that/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Buzzwords are a mainstay in our field, and "cyberterrorism" currently is one of the hottest.  But how does the definition of "terrorism" change when adding the complexities of the Internet? What does the term "cyber terrorism" actually mean?</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf, Deana Shick, Eric Hatleback</dc:creator><pubDate>Thu, 01 Feb 2018 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/declaring-war-on-cyber-terrorismor-something-like-that/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Situational Awareness</category><category>Network Situational Awareness</category><category>Cyber Missions</category><category>CERT/CC</category></item><item><title>Improving Data Extraction from Cybersecurity Incident Reports</title><link>https://www.sei.cmu.edu/blog/improving-data-extraction-from-cybersecurity-incident-reports/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post is the first in a series on improving useful data extraction from cybersecurity incident reports, focusing on work done by the SEI and US-CERT.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Samuel Perl</dc:creator><pubDate>Fri, 29 Sep 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/improving-data-extraction-from-cybersecurity-incident-reports/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cyber Missions</category><category>Situational Awareness</category></item><item><title>Ransomware: Best Practices for Prevention and Response</title><link>https://www.sei.cmu.edu/blog/ransomware-best-practices-for-prevention-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>On May 12, 2017, in the course of a day, the WannaCry ransomware attack infected nearly a quarter million computers. WannaCry is the latest in....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexander Volynkin, Angela Horneman, José Morales</dc:creator><pubDate>Wed, 31 May 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/ransomware-best-practices-for-prevention-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cyber Missions</category><category>Network Situational Awareness</category><category>Ransomware</category><category>Situational Awareness</category></item><item><title>Best Practices for Network Border Protection</title><link>https://www.sei.cmu.edu/blog/best-practices-for-network-border-protection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>When it comes to network traffic, it's important to establish a filtering process that identifies and blocks potential cyberattacks...</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rachel Kartch</dc:creator><pubDate>Mon, 15 May 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/best-practices-for-network-border-protection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cyber Missions</category><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Best Practices for NTP Services</title><link>https://www.sei.cmu.edu/blog/best-practices-for-ntp-services/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The network time protocol (NTP) synchronizes the time of a computer client or server to another server or within a few milliseconds of Coordinated Universal Time (UTC)....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Timur Snoke</dc:creator><pubDate>Mon, 03 Apr 2017 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/best-practices-for-ntp-services/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Best Practices in Network Security</category><category>Cyber Missions</category><category>Network Situational Awareness</category><category>Situational Awareness</category></item><item><title>Six Best Practices for Securing a Robust Domain Name System (DNS) Infrastructure</title><link>https://www.sei.cmu.edu/blog/six-best-practices-for-securing-a-robust-domain-name-system-dns-infrastructure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Discover six best practices to design a secure, reliable infrastructure and present an example of a resilient organizational DNS in this SEI blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Mark Langston</dc:creator><pubDate>Mon, 06 Feb 2017 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/six-best-practices-for-securing-a-robust-domain-name-system-dns-infrastructure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Situational Awareness</category></item><item><title>Distributed Denial of Service Attacks: Four Best Practices for Prevention and Response</title><link>https://www.sei.cmu.edu/blog/distributed-denial-of-service-attacks-four-best-practices-for-prevention-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Late last month, Internet users across the eastern seaboard of the United States had trouble accessing popular websites, such as Reddit, Netflix, and the New York Times....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rachel Kartch</dc:creator><pubDate>Mon, 21 Nov 2016 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/distributed-denial-of-service-attacks-four-best-practices-for-prevention-and-response/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Situational Awareness</category><category>Network Situational Awareness</category><category>Cyber Missions</category><category>Best Practices in Network Security</category><category>Distributed Denial Of Service (DDoS) Attacks</category></item><item><title>The Dyn Attack: Who Participated? Who Was Impacted?</title><link>https://www.sei.cmu.edu/blog/the-dyn-attack-who-participated-who-was-impacted/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Dive deeper into indirection participation in the Dyn attack and its effects in this informative SEI Blog post.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Wed, 02 Nov 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/the-dyn-attack-who-participated-who-was-impacted/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Cyber Missions</category><category>Situational Awareness</category></item><item><title>Choosing the History for a Profile in Simple Network Flow Anomaly Detection</title><link>https://www.sei.cmu.edu/blog/choosing-history-profile-simple-network-flow-anomaly-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>One of my responsibilities on the Situational Awareness Analysis team is to create analytics for various purposes....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Angela Horneman</dc:creator><pubDate>Fri, 08 Apr 2016 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/choosing-history-profile-simple-network-flow-anomaly-detection/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Situational Awareness</category></item><item><title>Border Gateway Protocol Update Metric Analysis</title><link>https://www.sei.cmu.edu/blog/border-gateway-protocol-update-metric-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>MRT is a file format used in BGP; in particular, it is used when the router writes updates into a log file....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Leigh Metcalf</dc:creator><pubDate>Tue, 15 Dec 2015 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/border-gateway-protocol-update-metric-analysis/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Network Situational Awareness</category><category>Security Vulnerabilities</category><category>CERT/CC</category><category>Situational Awareness</category></item></channel></rss>