10 November 2024 – Jonathan F. M. Reyes When it comes to cyber policy and infrastructure, it should be transparent to users what is known and what is speculative. Privacy, for example, should be defined immediately by cyber-based entities claiming to protect it, and we, as users, should be made aware of the rights…
CISO Fund Limits
10 November 2024 – Jonathan F. M. Reyes With a limited budget, I would prioritize basic cybersecurity training for all personnel. Fewer roles with more experience result in paying for less training. So, I would hire personnel with a background in cybersecurity and consolidate cyber related positions and responsibilities to reduce the total costs…
SCADA Systems
03 November 2024 – Jonathan F. M. Reyes Bluf SCADA systems do not eliminate cyber threats to critical infrastructure but can minimize damage by centralizing data and controls onto a digital monitor, allowing supervisory control in one location. Centralizing data and controls to one location also reduces the time it would take to independently monitor…
Cyber-Triangles and the AA
September 15, 2024 The CIA triad (confidentiality, integrity, and availability) models cybersecurity goals by laying out three fundamental practices and synthesizing them to protect data and information. Authentication and authorization are not the same thing but work together as a strategy to fulfill the goals of the CIA triad. Authentication verifies the user, and authorization…