Author Archives

Unknown's avatar

William Donaldson

Audit Phases

Continuously auditing any system or process is as vital as the building and maintenance stages of the initial build, all of which combine to create an effective product. There are eight phases of an audit engagement as described in Angel R. Otero’s publication, “Information Technology Environment and I.T. […]

State-Funded Cyberweapons

An interesting cyberweapon I have never heard about is China’s ‘Great Cannon’ cyberweapon, which is a state-operated DDoS tool. The Great Cannon hijacks web traffic from users within the ‘Great Firewall of China’ and redirects the traffic to other websites by injecting malicious JavaScript code into the insecure […]