Carefully created and thorough data backup (BCP) and recovery plans (DR) are crucial for anyone who wishes to secure their data in the event a problem arises; this is even more necessary if your company handles a large amount of sensitive data such as credit card information, transactions, […]
Continuously auditing any system or process is as vital as the building and maintenance stages of the initial build, all of which combine to create an effective product. There are eight phases of an audit engagement as described in Angel R. Otero’s publication, “Information Technology Environment and I.T. […]
An interesting cyberweapon I have never heard about is China’s ‘Great Cannon’ cyberweapon, which is a state-operated DDoS tool. The Great Cannon hijacks web traffic from users within the ‘Great Firewall of China’ and redirects the traffic to other websites by injecting malicious JavaScript code into the insecure […]
You must be logged in to post a comment.