by Matt Stuart | May 25, 2018 | Basics, Blog
Websites are problematic for cybersecurity because they’ve grown from a simple information page to interactive scripted content management systems that act as the front end for an organization’s database. It’s essentially a public facing application that’s allowed to...
by Matt Stuart | Apr 3, 2018 | Blog
Overview Information security for an organization is an ongoing process of users interacting with technology through a combination of policies, procedures, software and hardware to provide data confidentiality, integrity, and availability. All users are part of the...
by Matt Stuart | Mar 22, 2018 | Basics, Blog
The stakeholder is a term for an individual impacted by a corporation’s activities, and is in contrast to the idea of shareholder, which is a part owner of the corporation. It originated from Ian Mitroff’s book “Stakeholders of the Organizational Mind” and...
by Matt Stuart | Feb 26, 2018 | Blog
A corporate data network transmits billions of data packets per day internally and out to the Internet. The data flow creates event records from many sources such as firewall security logs, user account sign on logs, and data resource access logs. By NIST 800-53...
by Matt Stuart | Jan 5, 2018 | Basics, Blog
There’s a humorous sign frequently seen in various kinds of offices and workshops around North America. It says simply, “Fast, Good, or Cheap: Choose Two!” It’s a simple but useful model demonstrating the tradeoff between the constraints of quality, time, and cost. In...