In cybersecurity, risk assessment and risk management are vital cogs in the theoretical wheel of business success. In risk assessment, identifying all possible risks that an organization might face allows for a proper system to be created to facilitate an adequate protection system (risk management). Both risk assessment […]
When you are charged with hardening a target while working in cybersecurity, you can’t just start the process by blindly throwing some money at some costly equipment hoping for results. Instead, an in-depth security assessment needs to be completed, meticulously inspecting every layer of protection the target has, […]
To prepare for the coming Winter semester, I decided to start reading ahead so that I am prepared for my first assignments. The way I learn best is through interpreting an author’s views on a subject and converting them into my own thoughts; so, I decided to continue […]
You must be logged in to post a comment.