Category: Security

Non-State Cyberweapons

When it comes to non-state cyberweapons, there are some significant differences between them and state-funded devices/software. While the funding and manpower of non-state cyberweapons are certainly reduced, the potential consequences and reach of the weapons are still present. As cybercrime is quickly rising in the hands of often […]

Audit Phases

Continuously auditing any system or process is as vital as the building and maintenance stages of the initial build, all of which combine to create an effective product. There are eight phases of an audit engagement as described in Angel R. Otero’s publication, “Information Technology Environment and I.T. […]