The “Short Arm” of Predictive Knowledge

The approach of a cyber-policy with the “short arm” of predictive knowledge should be one that considers not the future and possibilities of attacks, but rather focuses on the known vulnerabilities and looks to strengthen the already existing frameworks. It would be too detrimental to try and leave a less secure system in place while…

Opportunities for Workplace Deviance

Cyber technology advances in the workplace have revolutionized efficiency and security in the workplace. Several key security features in the workplace require company employees to maintain a security clearance and maintain diligent practices as these security features rely on the employee. It is common place now to require a security clearance to work in most…

Ethical Considerations of CRISPR gene editing

There are many ethical considerations to be had with Bio Cybersecurity and specifically CRISPR gene editing. Society is on the brink of a technological nightmare scenario, where our own DNA could become assets or even weapons when in the hands of the wrong people. CRISPR gene editing has allowed for the modification of DNA strands…

Going on a job hunt!

One thing I noticed with all of these job listing is that almost, if not all of them, are government jobs mainly. Although the private sector does offer a few from some initial research I did, the majority of the first few results that were turned up were government job listings. All of these jobs…

CISO Accessibility Actions

In a hypothetical scenario where I am placed as the Chief Information Security Officer, I would take the basic, fundamental steps in ensuring a systems availability. The first and most pressing matter regarding uptime, is the servers on which these systems operate. Making sure that all hardware and software aspects remain up to date is…

What are the biggest IoT security risks and challenges?

Some of the biggest security risks that pose a threat to the internet-of-things would have to be the malicious actors trying to attack the systems we have in place. Since 2012, the world connected through IoT has seen an exponential increase in attacks and threats. In 2013 alone, in a study conducted by the University…

What is the difference between a threat and an attack?

The terms “threat” and “vulnerability” directly associate with one another. A threat is the prospect of damage being done and in the context this includes a possible hack, or cyber attack. Vulnerabilities are the means by which these threats become attacks and deal damage. It only comes from experience and applying these methods can we…

Pros and Cons of involving law enforcement in a Cybersecurity incident.

The decision to escalate incidents to law enforcement with conflict prevalent bears many pros and cons. In one hand, the resources and manpower that law enforcement holds is quite substantial when compared to that of a non government entity. The escalation also brings the introduction of potential long lasting effects such as lawsuits or fines…