Government Cyber Weaknesses & the Need for White Hats
by Todd Pritsky on April 15, 2019 at 1:01 PM
Have White Hat, Will Travel “A young boy, with greasy blonde hair, sitting in a dark room…[T]he weary system cracker telnets to the next faceless .mil site on his hit list.”
The Importance of a Business Impact Analysis
by CJ Hurd on April 6, 2019 at 1:03 PM
Wouldn’t it be nice if we could predict the future? You would know what stocks to invest in, what sports team was going win, and what lottery numbers to play. It sure would make life easy, wouldn’t it?! Well, unfortunately we can’t, so we are going to have to keep working hard, resear …
New York v. Illegal Withdrawal Specialists (23 NYCRR 500)
by Todd Pritsky on March 13, 2019 at 1:00 PM
A brief introduction into the recent New York State Department of Financial Services 23 NYCRR 500 cybersecurity regulations.
Software Development Lifecycle Simplified
by Sarina Resnick on March 3, 2019 at 1:00 PM
Project creation can be stressful, especially when creating something completely new. When creating a project that is software-based, there is a specific process that is created to aid the production of said project.
Response Operations: BCP, IRP, and DRP - Why You Need all Three
by Andrew Paull on February 21, 2019 at 1:00 PM
No well-managed organization is immune to the risk of the potential business interruptions that may occur from time to time, whether caused by acts of nature, malicious attack, or simple human error. Depending on the severity of the interruption and the organizational assets and busin …
The Cyber Rabbit Hole: Computer Forensics
by Danielle Corsa on February 17, 2019 at 1:00 PM
This blog is for anyone daring and brave enough to follow the rabbit hole into the realm of computer forensics where there lies the truth. The main objective for an analyst is to be able to dig up the digital past with no judgement of the outcome. There must be a legitimate need to co …