Shawn Riley

Shawn Riley

Cybersecurity Scientist | US Navy Cryptology Community Veteran | VFW Member | Autistic | LGBTQ | INTJ-Mastermind

View articles by Shawn Riley

Web 3.0 Meets Web3: Bridging Interoperability with Decentralization

Web 3.0 Meets Web3: Bridging…

December 4, 2024

10 likes5 comments

From Manual Tradecraft to Scientific Foundations in Cybersecurity

From Manual Tradecraft to Scientific…

November 30, 2024

10 likes6 comments

Structured Analytic Techniques (SATs): Explanation and Relevance in Cybersecurity Science

Structured Analytic Techniques (SATs):…

November 27, 2024

11 likes2 comments

When Should a CISO Hire a Cybersecurity Scientist?

When Should a CISO Hire a Cybersecurity…

November 25, 2024

12 likes1 comment

The Risk of Cybersecurity Science: How Cybersecurity and the Cybersecurity Organization Transformed Across the Decades 1990s to 2024

The Risk of Cybersecurity Science: How…

November 25, 2024

11 likes1 comment

Securing Enterprise AI with Need-to-Know Controls: How Ontologies, GraphRAG, and RDF-Star Enable Precise Access

Securing Enterprise AI with Need-to-Know…

October 30, 2024

19 likes2 comments

Revolutionizing CISA TIES with Hybrid AI Data Fabric

Revolutionizing CISA TIES with Hybrid AI…

October 17, 2024

14 likes9 comments

The Synergy of Symbolic and Non-Symbolic AI

The Synergy of Symbolic and Non-Symbolic AI

October 15, 2024

3 likes5 comments

A Cybersecurity Look At RDF v1.2 Knowledge Graphs vs Linked Property Graphs

A Cybersecurity Look At RDF v1.2 Knowledge…

October 9, 2024

1 like

The Ontological Foundation: A Cornerstone for Trustworthy AI

The Ontological Foundation: A Cornerstone…

October 6, 2024

17 likes

Assessing Gaps in MITRE ATLAS (Oct 2024)

Assessing Gaps in MITRE ATLAS (Oct 2024)

October 5, 2024

6 likes

Applied AI in Cybersecurity - 2024 Edition

Applied AI in Cybersecurity - 2024 Edition

August 12, 2024

21 likes3 comments

MITRE ATT&CK Top 10 Techniques for Ransomware: Understanding and Measuring the Effectiveness of Ransomware Mitigations

MITRE ATT&CK Top 10 Techniques for…

June 14, 2024

10 likes

Evaluating the Impact of Cybersecurity Decisions on Adversary Behavior

Evaluating the Impact of Cybersecurity…

June 11, 2024

3 likes

The Pivotal Role of a Chief Cybersecurity Scientist Across Different Cybersecurity Scenarios

The Pivotal Role of a Chief Cybersecurity…

March 21, 2023

16 likes1 comment

Asking ChatGPT4 What It Thought of My Cyber Terrain Model

Asking ChatGPT4 What It Thought of My Cyber…

March 18, 2023

23 likes10 comments

Evidence-based Attack Path Scenarios, MITRE's Attack Flow, and Traditional Attack Path Scenarios: A Comprehensive Comparison

Evidence-based Attack Path Scenarios…

March 17, 2023

11 likes1 comment

Building Cyber Resiliency: Goals, Constructs, and Risk Management Strategies in Practice and Future Directions

Building Cyber Resiliency: Goals…

February 17, 2023

8 likes

Maximizing Cyber Defense Capabilities with Data-Centric Architecture and Semantic Interoperability

Maximizing Cyber Defense Capabilities with…

February 17, 2023

From Data to Wisdom: Integrated Adaptive Cyber Defense and the Importance of Knowledge Representation & Reasoning

From Data to Wisdom: Integrated Adaptive…

February 17, 2023

8 likes2 comments

  翻译: