The biggest threat of deepfakes isn’t the AI—it’s your brain. I detail the psychological reasons (like the “seeing-is-believing” bias) why humans fail to detect these fakes. Don’t be fooled. Read the full research!
Category: Human Factors
The CIA Triad & the AAA Framework
Dive into the essential backbone of cybersecurity. This paper breaks down the CIA Triad (Confidentiality, Integrity, Availability) and pairs it with the operational power of the AAA Framework (Authentication, Authorization, Accounting). Learn how these twin concepts form the non-negotiable foundation for securing any modern digital asset.
Reducing Human Errors That Influence Data Breaches
95% of data breaches involve human error. My paper details the cognitive and organizational factors that lead to these errors and outlines technical and non-technical strategies to build a Human Firewall. Full ODU analysis here!
Artificial Intelligence in Digital Forensics: Opportunities, Risks, and Future Directions
Analysis of how artificial intelligence enhances digital forensics, including automation, threat detection, associated risks, and future trends in AI-driven investigations.
Managing Cybersecurity Change: Using Tactical Empathy to Overcome Resistance
Examines how tactical empathy improves cybersecurity change management by reducing resistance, strengthening communication, and supporting successful adoption of new security practices.
Security Polices from a CISO’s Perspective
Explores security policies from a CISO’s perspective, highlighting their role in governance, risk management, strategic decision-making, and building organizational security.
Access Controls: Single Sign-On (SSO)
Explains how access controls and Single Sign-On (SSO) improve security and usability by centralizing authentication, reducing login friction, and strengthening identity management.
Network & Cyber Security: Tools, Costs, and Efficiency
Overview of network cybersecurity tools, comparing costs, efficiency, and how organizations evaluate firewalls, SIEMs, IDS/IPS, and other defensive technologies.
The NotPetya Cybersecurity Attack & Breach
Explains the NotPetya cybersecurity attack, how it spread, why it caused widespread damage, and the key lessons learned about resilience, segmentation, and global cyber risk.
IT Infrastructure: Internet of Things (IoT)
Examines how the Internet of Things (IoT) impacts IT infrastructure, including connectivity, automation, security risks, management challenges, and modern network requirements.
Internet of Things (IoT): Security Challenges
Explores key IoT security challenges, including weak authentication, poor patching, privacy risks, large attack surfaces, and vulnerabilities in connected devices.
Computer Security vs. Information Security
Explains the difference between computer security and information security, including their goals, scope, protective controls, and roles in organizational risk management.