In the context of diminishing state power and the intelligification of the material world, as articulated by Verbeek in “Designing the Public Sphere: Information Technologies and the Politics of Mediation,” it is imperative to rethink the regulation of markets, businesses, groups, and individuals to ensure equitable and ethical engagement with technology. As these entities are…
Author: dwill020
The “Short Arm” of Predictive Knowledge
The development of cyber-policy and infrastructure in the face of limited predictive knowledge demands a proactive and flexible approach that prioritizes resilience rather than reliance on forecasts alone. Given the rapidly evolving nature of cyber threats and technologies, policies must be dynamic, allowing for real-time reassessment and adaptation based on current landscapes rather than static…
Exploring Attacks on Availability
An “attack on availability” is a type of cyberattack aiming to disrupt the access and functionality of systems, networks, or data, effectively denying service to legitimate users. These attacks are designed to prevent users from accessing critical resources, which is one of the core tenets of cybersecurity, alongside confidentiality and integrity. A notable example is…
The Human Factor in Cybersecurity
As a Chief Information Security Officer (CISO) tasked with balancing a limited cybersecurity budget, it is imperative to address both technological and human factors in mitigating cyber threats. The first step is to evaluate the current cybersecurity posture and identify the most pressing vulnerabilities. Prioritizing can be guided by risk assessments that consider both the…
SCADA Systems
Danol WilliamsCYSE 200TSCADA SystemsApril 6, 2025Critical infrastructure systems, such as water treatment plants, power generation facilities, andgas pipelines, are vital for the functioning of our society. However, these systems areincreasingly vulnerable to various risk factors, including cyberterrorism, unauthorized access,and hardware failures. The interconnectedness of modern infrastructure, facilitated bytechnologies like Supervisory Control and Data Acquisition (SCADA)…
Hacking Humans
The article “Hacking Humans: Protecting Our DNA From Cybercriminals” explores the burgeoning realm of DNA digitization through direct-to-consumer services and the emerging field of “cyberbiosecurity.” The discussion highlights the dual-edged sword of digitizing human DNA: its potential for medical advancements versus the significant privacy and security risks it entails. The author initially viewed these services…
Cyber Roles & Responsibilities
Danol WilliamsCYSE 200TWrite Up 28 February 2025 Cyber Roles & Responsibilities: Chief Executive Officer (CEO) The Chief Executive Officer (CEO) plays a crucial role within the cybersecurity team, serving as not only a leader but also a pivotal decision-maker regarding the organization’s cybersecurity strategy. The CEO is typically the highest-ranking executive in a company, responsible…
Components of a Business
Danol Williams CYSE 200TWrite Up 18 February 2025Components of a BusinessIdentify other components of a business. A business is a complex entity composed of several interrelated components that work together to achieve organizational goals. At its core, strategy is essential, as it defines the overall direction and objectives of the business, guiding decision-making processes. In…
Protecting Availability
As the Chief Information Security Officer (CISO) for a publicly traded company, ensuring the availability of our systems is paramount to maintaining business continuity and protecting shareholder value. To achieve this, a multi-layered approach to redundancy and resilience is crucial. First, I would implement a robust backup strategy that includes regular backups of all critical…
The NIST Cybersecurity Framework
The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides organizations with a structured approach to managing and mitigating cybersecurity risks. One of the primary benefits of using the NIST Cybersecurity Framework is its flexibility. It is designed to be adaptable to organizations of all sizes, sectors, and maturity levels, allowing each organization to…