Tim LaytonThe Business Case For Cyber Risk AutomationAs digital threats like phishing attacks become increasingly sophisticated, traditional cybersecurity frameworks such as NIST CSF and ISO…8 min read·May 6, 2024----
Tim LaytonEmbracing Zero Trust Architectures and Software Defined Networking: A Strategic Overview for…In this concise article, I present a clear and compelling business case tailored for executive leaders, detailing why adopting advanced…5 min read·Apr 29, 2024----
Tim LaytonOverview of Pgmpy Python Library for Cybersecurity Risk Analysis Using Bayesian NetworksIn the new cloud-computing era, marked by its complex and evolving threat landscape, Bayesian Networks and Python are pivotal tools in…9 min read·Apr 5, 2024----
Tim LaytonThe Risk Matrix is Dead and the Future of Cybersecurity Risk Analysis is Based on Bayesian…The dynamic landscape of cybersecurity, propelled by the advent of cloud computing, demands a paradigm shift from traditional risk…5 min read·Apr 5, 2024----
Tim LaytonHow To Connect To & Control Azure From Your Mac Using PowerShellTo connect to your Microsoft Azure subscription and use Power Shell from your Mac, you need to follow these steps:4 min read·Jan 25, 2024----
Tim LaytonA Deep Dive into CNAPP and Wiz.io’s Innovative Toxic Pairs FeatureIntroduction to CNAPP9 min read·Jan 23, 2024--1--1
Tim LaytonHow To Calculate The Probability of Cyber Breach Attack Methods Using Python and Bayesian…I share a real-world Python program I created to help me compute and visualize probability distributions for a Web App Attack methods.7 min read·Nov 27, 2023----
Tim LaytonHow To Program a Cybersecurity Loss Exceedance Curve in PythonIn this article, I will walk through the process of programming a LEC curve in Python.13 min read·Nov 27, 2023----
Tim LaytonLaplace and Bayes: Dueling Theories for Cybersecurity Risk AnalysisBefore we dive into the differences between Laplace’s Rule and Bayes Theorem, I need to lay down a quick foundation.7 min read·Nov 24, 2023----
Tim LaytonApplying Bayes’ Theorem to Assess the Risk of Phishing-Induced Cyber BreachesI am committed to equipping cybersecurity professionals with the robust capabilities of quantitative Bayesian statistical methods. By…5 min read·Nov 23, 2023----