Why are you interested in cybersecurity technology? Journal 1

Technology is all around us, and we usually interact with it many times each day. Therefore, we put a lot of our personal information on these devices, so it is no surprise that hackers see them as highly valuable targets. For most people, they have more information pertaining to them on technology than they do…

Thinking Ahead

Given the cybersecurity world, and all aspects that are involved in it require some questions to be answered. For example, how does a theoretical idea, such as the CIA triad play a role in cybersecurity? Who owns, and/or manages the data that cybersecurity is set up to protect? Knowledge in the cyber world is constantly…

When the Workplace is not Quite the Workplace

In the workplace, work is happening everyday. Days go by, and people do their thing. Sometimes, things don’t always go according to protocols and procedures. For example, a co-worker may need access to a confidential document, and their co-worker sends it on their personal smartphone. This action would have created an open hole in security….

How Should a CISO Take Responsibility?

The Chief Information Security Officer has the duty to secure the company over a variety of aspects. In this situation, the CIA triad sets a good foundation for security. Using this model, along with other NIST frameworks, can provide helpful guidance and information. In my opinion, employee training is essential. All it takes is for…

The Rough Framing for Cybersecurity

Using the NIST Framework gives a good baseline to start from. It gives a good and solid foundation. The CIA triad is what should result from good NIST framework. It ensures that everything runs smoothly and efficiently. That way a company can make more $$$. At my future workplace, the work you do needs to…