Utilizing the National Institute of Standards and Technology Cybersecurity Framework, the IBM Cost of a Data Breach Report 2022, and other resources, I have broken down some of the monetary costs and potential benefits a business with a developed cyber security program could expect. To help amplify the data, I have found it beneficial to…
Author: ladle001
How has cyber technology created opportunities for workplace deviance?
In the past, when a person had something that they wanted to keep secret, safe, or private, the process was very straightforward. They put the important thing in a room or box and lock it. If it’s really important, they would pay someone to watch the room or box and keep anyone from accessing it.As…
Personal Data and Cybersecurity Risks
In discussing personal data security and the current cybersecurity risks, I chose to draw parallels to the European Union due to the clear superiority of the processes that exist within their cybersecurity structure. In the National Cyber Security Index, of the top 10 ranking countries, the EU accounts for nine of them and only two…
Cybersecurity Through Multiple Diciplines
The question has been raised to me on more than one occasion: why cybersecurity? At heart I am a problem-solver and war fighter and, simply put, I can’t imagine a world in which humans exist and conflict does not. Whether it be planet Earth or a metaverse built on the backbone of a blockchain, the…