The Legal Response to Technological Advancement

The law is constantly changing and evolving. It develops in response to societal and technological changes. It is, however, not changing quickly enough. In comparison to the fast evolution in information technologies, it lags far behind. Security risks and inadequate auditing are becoming increasingly widespread as technology advances. To avert such occurrences, new legislative regulations…

SCADA Systems

SCADA stands for supervisory control and data acquisition, and it refers to the industrial control systems (ICS) that are used to manage infrastructure processes. Critical infrastructure is defined as the physical and virtual assets, systems, and networks that have become so important to us that their impairment or destruction would seriously damage security, economic problems,…

The Human Factor in Cybersecurity

After reading two contrasting opinions, I have opened my perspective about investing more money in technology and training than I did previously. Reading Jeff Capone’s article opened my eyes to how technology is in the hands of humans and how the world is evolving. Being human It’s perfectly natural to seek the simplest and quickest…

The NIST Cybersecurity framework

What benefit can organizations gain from the NIST Cybersecurity Framework? The NIST Cybersecurity Framework can help to understand your organization better and manage cyber security risks effectively. An understanding of risk tolerance can allow organizations to measure and report changes to their cybersecurity programs. This can help to make critical decisions, determine what actions need…