Many of us are well versed and confident in the systems and networks we create, manage, and defend at our place of work. Interestingly, several do not apply the same devotion to their homes. While some may not wish to ‘bring their work home with them,’ those such […]
While cloud service providers promise you the world of increased security, scalability, and a seemingly endless number of features, those who have actually worked on the systems can attest to the horrors of attempting to secure them; however, by use of threat modeling, this often-daunting task can be […]
Since this week’s readings discussed ethical, legal, illegal, and morally defensible actions in cyberspace, I thought I would discuss the theory of the common good approach and how it applies to cybersecurity; this topic is interesting as many world leaders and the general public do not quite understand […]
You must be logged in to post a comment.