Matt’s Blog
Information Security
Risks of Counterfeit Hardware or Embedded Malware
Network and security hardware undergoes long and expensive design and development processes to remove vulnerabilities and flaws. Rogue hardware manufacturers in Asia are producing reverse engineered clones that mimic functioning and appearance of the devices for a...
Ethical Conflicts in Cybersecurity
Ethical issues arise in the cybersecurity field when competing moral interests conflict. The following are examples of such conflicts. A business has the right and need for access to the data stored on its networks and this can conflict directly with the...
Risks of Third Party Service Providers or Vendors
Few organizations can afford the cost of a dedicated and fully staffed SOC with initial startup and annual operating costs in the millions of dollars. Many businesses are outsourcing the SOC and SIEM functions to third party service providers. This requires that the...
Integrating Disaster Recovery with Information Technology Governance Frameworks
Overview Disaster of a natural or man-made variety can strike a business without warning and may cause damage serious enough to interrupt operations for a significant period of time. This would cause loss of profit and reputation and could negatively impact all...
Ethics of Information Security
The stakeholder is a term for an individual impacted by a corporation’s activities, and is in contrast to the idea of shareholder, which is a part owner of the corporation. It originated from Ian Mitroff’s book "Stakeholders of the Organizational Mind" and broadens...
Website Risks
Websites are problematic for cybersecurity because they’ve grown from a simple information page to interactive scripted content management systems that act as the front end for an organization’s database. It’s essentially a public facing application that’s allowed to...