by Matt Stuart | Aug 8, 2018 | Basics, Blog
Network and security hardware undergoes long and expensive design and development processes to remove vulnerabilities and flaws. Rogue hardware manufacturers in Asia are producing reverse engineered clones that mimic functioning and appearance of the devices for a...
by Matt Stuart | Jul 22, 2018 | Basics, Blog
Ethical issues arise in the cybersecurity field when competing moral interests conflict. The following are examples of such conflicts. A business has the right and need for access to the data stored on its networks and this can conflict directly with the...
by Matt Stuart | Jul 17, 2018 | Basics, Blog
Few organizations can afford the cost of a dedicated and fully staffed SOC with initial startup and annual operating costs in the millions of dollars. Many businesses are outsourcing the SOC and SIEM functions to third party service providers. This requires that the...
by Matt Stuart | Jun 9, 2018 | Basics, Blog
The stakeholder is a term for an individual impacted by a corporation’s activities, and is in contrast to the idea of shareholder, which is a part owner of the corporation. It originated from Ian Mitroff’s book “Stakeholders of the Organizational Mind” and...
by Matt Stuart | May 25, 2018 | Basics, Blog
Websites are problematic for cybersecurity because they’ve grown from a simple information page to interactive scripted content management systems that act as the front end for an organization’s database. It’s essentially a public facing application that’s allowed to...
by Matt Stuart | Mar 22, 2018 | Basics, Blog
The stakeholder is a term for an individual impacted by a corporation’s activities, and is in contrast to the idea of shareholder, which is a part owner of the corporation. It originated from Ian Mitroff’s book “Stakeholders of the Organizational Mind” and...