by Matt Stuart | Nov 22, 2017 | Blog
There’s a looming disaster on the cyber horizon coming to the Internet and cellular communications in the next few years(McGrew, 2015). Specifically, 90% of the current encryption used for data transmission on the internet and in cellular phones will cease to be...
by Matt Stuart | May 19, 2017 | Blog
A complete and mature organizational cybersecurity infrastructure requires the use of a governance framework such as COBIT 4.1 aligned with a security control framework such as ISO/IEC 27002:2005. This provides a process to manage the complex security control...
by Matt Stuart | Feb 15, 2017 | Blog
On May 7, 2014 Chinese hackers gained access to the United States Office of Personnel Management (OPM) but the breach wasn’t discovered until April 15, 2015, and the breach wasn’t announced until June 2015. The attackers had access to the OPM servers for almost a full...
by Matt Stuart | Apr 6, 2016 | Blog
Overview The cybersecurity industry is an aggregation of products and services to protect computer networks from data confidentiality, integrity and availability. It’s vital to the health and continued functioning of the Internet and all connected organizations....
by Matt Stuart | Nov 9, 2015 | Blog
Overview Security of software products during both development and operations is vital and can effects national security, therefore the security control baseline selected will be ‘high-impact” criteria in NIST 800-53 based on the criteria in NIST 800-60 stating...