A zero-trust network isn’t enough. You need a human firewall. My research details the critical importance of human-centric defense, exposing how easily people are exploited in sophisticated attacks. Click for the Hacking Humans paper.
Category: Business
Ethernet Network Design Project
Designed a complete Ethernet network for a four-floor school with 148 Cat6 drops, a fiber backbone, VLAN segmentation, Wi-Fi 6 access points, PoE switches, and pfSense security.
Building Amazon’s Next-Generation Fulfillment Network
How did Amazon cut shipping costs & boost delivery speed? I break down the Project FC Network Initiative—the massive regionalization effort powered by network optimization, Edge Computing, and AWS cloud. See the business case for next-gen fulfillment. Read the full paper!
The CIA Triad & the AAA Framework
Dive into the essential backbone of cybersecurity. This paper breaks down the CIA Triad (Confidentiality, Integrity, Availability) and pairs it with the operational power of the AAA Framework (Authentication, Authorization, Accounting). Learn how these twin concepts form the non-negotiable foundation for securing any modern digital asset.
Reducing Human Errors That Influence Data Breaches
95% of data breaches involve human error. My paper details the cognitive and organizational factors that lead to these errors and outlines technical and non-technical strategies to build a Human Firewall. Full ODU analysis here!
The Role and Necessity of the NIST Cybersecurity Framework
The NIST CSF is the gold standard for risk management. My paper breaks down the core Identify, Protect, Detect, Respond, Recover functions and explains how to integrate this framework into any organizational culture. Download the full ODU guide!
The NIST Cybersecurity Framework & the Importance of Proper Documentation
Overview of the NIST Cybersecurity Framework and why proper documentation is essential for risk management, compliance, incident response, and organizational security.
IPv6 Security: Enhancements, New Challenges, and Adoption Barriers
Explores IPv6 security enhancements, emerging challenges, and key adoption barriers, including built-in protections, deployment issues, and organizational considerations.
Managing Cybersecurity Change: Using Tactical Empathy to Overcome Resistance
Examines how tactical empathy improves cybersecurity change management by reducing resistance, strengthening communication, and supporting successful adoption of new security practices.
Security Polices from a CISO’s Perspective
Explores security policies from a CISO’s perspective, highlighting their role in governance, risk management, strategic decision-making, and building organizational security.
Access Controls: Single Sign-On (SSO)
Explains how access controls and Single Sign-On (SSO) improve security and usability by centralizing authentication, reducing login friction, and strengthening identity management.
Network & Cyber Security: Tools, Costs, and Efficiency
Overview of network cybersecurity tools, comparing costs, efficiency, and how organizations evaluate firewalls, SIEMs, IDS/IPS, and other defensive technologies.
Phishing Campaigns: Protection Against Credential Theft
Explores how phishing campaigns target users for credential theft and outlines key protections including MFA, awareness training, email filtering, and zero-trust security.
IPv6 Cybersecurity Enhancements
Explores IPv6 cybersecurity enhancements, including improved routing security, built-in protections, simplified architectures, and reduced vulnerabilities compared to IPv4.
Cybersecurity Incidents & Law Enforcement
Examines how law enforcement responds to cybersecurity incidents, including evidence collection, jurisdiction challenges, investigative processes, and interagency collaboration.
Internet of Things (IoT): Security Challenges
Explores key IoT security challenges, including weak authentication, poor patching, privacy risks, large attack surfaces, and vulnerabilities in connected devices.
Linux – Scripting
Overview of Linux scripting fundamentals, including automation, task efficiency, system management workflows, and how scripting improves technical productivity.
“Going Dark”
An Overview and Analysis of Former FBI Director James Comey’s Security Concerns aboutLaw Enforcement and Encryption