95% of data breaches involve human error. My paper details the cognitive and organizational factors that lead to these errors and outlines technical and non-technical strategies to build a Human Firewall. Full ODU analysis here!
Category: Training
Determinism within Cybersecurity & Computer Hacking
An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.
Security Polices from a CISO’s Perspective
Explores security policies from a CISO’s perspective, highlighting their role in governance, risk management, strategic decision-making, and building organizational security.
Malicious Code and Activity – Mitigation Methods
Overview of malicious code threats and mitigation methods, including detection, containment, system hardening, user awareness, and modern cybersecurity defenses.
Ransomware Mitigation Strategies for Windows Systems: Securing Servers and Endpoints
Explores ransomware mitigation strategies for Windows systems, including backups, hardening, access controls, monitoring, and endpoint protection for servers and endpoints.
Network & Cyber Security: Tools, Costs, and Efficiency
Overview of network cybersecurity tools, comparing costs, efficiency, and how organizations evaluate firewalls, SIEMs, IDS/IPS, and other defensive technologies.
Cyber Threats vs. Cyber Attacks
Explains the difference between cyber threats and cyber attacks, how each affects risk, defense strategies, and organizational security planning.