Strategy, Architecture, Security, Technology, Operations Franklin Donahoe Strategy, Architecture, Security, Technology, Operations Franklin Donahoe

The Strategic and Technical Analysis of Model Context Protocols

This article provides a strategic and technical analysis of the Model Context Protocol (MCP), an open standard introduced by Anthropic in November 2024. It explains how MCP enables AI systems, particularly large language models (LLMs), to securely and reliably communicate with external data, applications, and services, transforming them from static knowledge bases into dynamic, agentic "doers." The document details MCP's foundational architecture, its client-server-host model, and the use of "primitives" like tools, resources, and prompts. It also discusses the business value proposition of MCP, including mitigating hallucinations, increasing utility, fostering a plug-and-play AI ecosystem, and key enterprise use cases. Finally, the article assesses the risks and limitations of MCP, such as prompt injection and architectural challenges, and outlines the competitive landscape, highlighting its rapid adoption by major players like OpenAI, Google, and Microsoft as a de-facto standard for the agentic AI era.

Read More
Strategy, Security, Architecture, Operations Franklin Donahoe Strategy, Security, Architecture, Operations Franklin Donahoe

The Emergence of User Adaptive Risk Management

This article discusses the emergence of User Adaptive Risk Management (UARM) as an evolution of traditional Security Awareness and Training (SA&T). It highlights how UARM uses AI and User Behavior Analytics to move beyond basic awareness to real-time, individualized risk mitigation. The article also touches on the potential benefits and challenges of UARM, including privacy concerns and the importance of integration with existing security systems, while referencing companies like Dune Security as innovators in the field.

Read More
Leadership, Operations, Security, Strategy Franklin Donahoe Leadership, Operations, Security, Strategy Franklin Donahoe

Bridging the Divide

This article discusses the challenges CISOs face in communicating cybersecurity risks effectively to various audiences, including the board, senior management, and technical teams. It highlights the limitations of traditional cybersecurity metrics and advocates for outcome-driven metrics tailored to each audience's needs. The article also explores communication strategies, such as translating technical concepts into business impact and utilizing frameworks like cascading communication, to enhance transparency, build trust, and foster cybersecurity accountability within an organization.

Read More
Security, Technology, Operations Franklin Donahoe Security, Technology, Operations Franklin Donahoe

The MITRE CVE System

This article provides a comprehensive overview of the Common Vulnerabilities and Exposures (CVE) system, the global standard for identifying and naming cybersecurity vulnerabilities. It covers the history, purpose, and operational structure of CVE, including the roles of MITRE Corporation, CNAs, and the CVE Board. The article also discusses the importance of CVE in the cybersecurity ecosystem, its integration with other standards like NVD and CVSS, and the potential impact of its discontinuation. Additionally, it examines alternative vulnerability identification systems and highlights the ongoing challenges and future directions of the CVE program, including recent funding concerns.

Read More
Strategy, Architecture, Security, Technology, Operations Franklin Donahoe Strategy, Architecture, Security, Technology, Operations Franklin Donahoe

Next-Generation Security Operations Architecture and Delivery for the Enterprise

This article discusses the evolution of Security Operations Centers (SOCs) from traditional models to next-generation architectures. It highlights the limitations of traditional SOCs, driven by siloed tools and manual processes, and explores the drivers pushing organizations towards more advanced approaches. The report delves into the technological advancements revolutionizing the SOC technology stack, including headless SIEM, XSIAM, XDR, SOAR integration, and the use of AI. It also examines the changes in the SOC operating model and talent landscape, as well as the impact on traditional SOC platforms. Finally, it provides strategic recommendations for CISOs and SOC leaders to navigate this evolution and build more resilient security postures.

Read More