Matt’s Blog

Information Security

 

Risks of Counterfeit Hardware or Embedded Malware

Risks of Counterfeit Hardware or Embedded Malware

Network and security hardware undergoes long and expensive design and development processes to remove vulnerabilities and flaws. Rogue hardware manufacturers in Asia are producing reverse engineered clones that mimic functioning and appearance of the devices for a...

Ethical Conflicts in Cybersecurity

Ethical Conflicts in Cybersecurity

Ethical issues arise in the cybersecurity field when competing moral interests conflict. The following are examples of such conflicts.   A business has the right and need for access to the data stored on its networks and this can conflict directly with the...

Risks of Third Party Service Providers or Vendors

Risks of Third Party Service Providers or Vendors

Few organizations can afford the cost of a dedicated and fully staffed SOC with initial startup and annual operating costs in the millions of dollars. Many businesses are outsourcing the SOC and SIEM functions to third party service providers. This requires that the...

Ethics of Information Security

Ethics of Information Security

The stakeholder is a term for an individual impacted by a corporation’s activities, and is in contrast to the idea of shareholder, which is a part owner of the corporation. It originated from Ian Mitroff’s book "Stakeholders of the Organizational Mind" and broadens...

Website Risks

Website Risks

Websites are problematic for cybersecurity because they’ve grown from a simple information page to interactive scripted content management systems that act as the front end for an organization’s database. It’s essentially a public facing application that’s allowed to...