IT Roles: Security Control Assessor

Name: Isaac Huston Date: February 8, 2025 IT Roles: Security Control Assessor Many organizations have multiple IT security roles, but one that significantly strengthens a company’s security posture is the Security Control Assessor (SCA). Often associated with Red Team activities, SCAs operate within mature IT environments, assessing security controls, systems, and personnel to identify vulnerabilities…

Protecting Information with the CIA Triad

Name: Isaac Huston Date: February 21, 2025 Protecting Information with the CIA Triad The CIA Triad (Confidentiality, Integrity, and Availability) is the core model for cybersecurity. It ensures that sensitive information remains protected, accurate, and accessible when needed. Understanding these principles, along with the distinction between authentication and authorization, is necessary for maintaining security. The…

Computers & Humans: Cybersecurity Requires both.

Name:         Isaac Huston Date: April 1, 2025 Computers & Humans: Cybersecurity Requires both. Information security requires defense in depth. As computer systems become more advanced and secure, the ability to breach a system which stores sensitive data begins to rely more heavily on the human component of which most systems require. Having properly trained humans…