Build a Nearly Free Vulnerability Testing Environment
I mentored ten (10) senior computer and data science students on their capstone project at New Jersey Institute of Technology (NJIT). ...
GDPR - Global Data Protection Regulation
The ISACA NY Chapter invited me to participate in their Executive Roundtable on the EU GDPR (Global Data Privacy Regulation). Following...
IRS Scammers Target College Students
IRS scam HPE CaaS Header Footer Data Published 10/30/2015 06:00:23 AM, Template Published: UNKNOWNData Published 10/30/2015 06:00:23...
Securing application data while maintaining full functionality
Two Key requirements to consider in evaluating data security are: Referential Integrity & Data schema/application format
Detection and Prevention of 'unauthorized' Backdoors
Originally Published HPE Community HPE CaaS Header Footer Data Published 10/30/2015 06:00:23 AM, Template Published: UNKNOWNData...
Are you Blindfolded? Why SIEM, app sec, behavior analytics are crucial for security
Originally posted on TechBeacon Would you walk, run, or drive a car blindfolded? Of course not. But if you are running your environment...
Password security fail? Add multifactor authentication, behavior analytics
Originally posted on TechBeacon Few people can remember a time when user names and passwords weren't required for access to applications...
NSA 'hacker-in-chief' talks top ways to prevent exploits
Originally published by TechBeacon Rob Joyce, leader of the National Security Agency’s (NSA) Tailored Access Operations (TAO), was...