The Human Factor in Cybersecurity

How would I balance the tradeoff of training and additional cybersecurity technology?As being Chief Information Security Officer and looking back on my career I wouldn’t focus as heavily on training that wasn’t on the job training I may refer individuals to learn basics but feel as many individuals can read book all day but when…

The CIA Triad

CIA main duty is to collect and analyze foreign intelligence and conduct covert action so tying in CIA Triad they specialize in keeping and protecting secret information from being espionage and falling into wrong hands while also improving and detecting any Dos attacks that may occur. Authentication is taking steps to steps to making sure…

SCADA Systems

Explaining Vulnerabilities and Role of SCADA applications Scada is a combination of hardware and software used in enabling the automation of industrial processes by capturing Operational technology real time data such as valves, motors or pumps. Many of their vulnerabilities come from software issues while lack of security capabilities are their main problems. SCADA is…

Workplace Deviance

Workplace Deviance has definitely grown from cyber technology mainly the use of advancement in technology. As Gen Z generation were so accustomed to snap chatting, recording or getting some type of photographic imagery some people don’t understand what they may be doing. The cause of doing these things on social media that there company may…