Restricting access to computer systems requires a sure means of identifying authorized users. We access systems every day. We sign on to our laptops and mobile devices with passwords and passcodes. We type in our usernames and password to access Facebook, Twitter, TikTok, and Instagram. We connect from remote locations [...]
When people hear or see the letters CIA, they think of the U.S. Federal Government’s Central Intelligence Agency - CIA. However, those same three letters represent Confidentiality, Integrity, and Availability in Cybersecurity. In comparison, the Central Intelligence Agency serves and protects the U.S. Federal Government and the President. In contrast, the letters C-I-A serves as [...]
Cybersecurity workers protect our most important and private information, from bank accounts to sensitive military communications. Demand for cybersecurity specialists has soared in the last decade. However, a dangerous shortage of cybersecurity workers in the United States puts our digital privacy and infrastructure at risk. Numerous factors are contributing to [...]
During these times, the term Zero Trust has exploded. The Zero Trust term has become misunderstood, and it's becoming a bunch of hype to a lot of businesses, and they think it's just a buzzword that adds much confusion to its definition. However, the term has been around for years, [...]
It's official. I've just received my (ISC)2 CCSP Certified Cloud Security Professional certification. Passing the CCSP exam was a challenge, but I want to make it easier for you. I want to share my experience and preparation notes with those who are interested in taking the exam. The CCSP is the top-ranked [...]
Don't fall victim to a data hostage. Ransomware attacks are on the rise in the U.S. According to the 2021 edition of the "Cost of Data Breach." On average, a single data breach increased by nearly 10% from 2020 to $4.24 million, the high ever recorded. Ransomware attacks cost an [...]
Cybersecurity must be a forethought, not an afterthought for application and data security architectures. Security has to be "baked" into your application development process. Before you build applications, migrate applications to the cloud, and modernize your applications, the cybersecurity team must have a seat at the table from the very [...]
Cloud adoption is accelerating. It's no surprise that the cloud unlocks tremendous business opportunities, but moving to the cloud requires organizations to rethink security. It begins with understanding the adoption model. In a traditional model, the organization would own and manage 100% of its workloads. The ownership and management of [...]
Cloud computing is widely adopted (Public cloud, Private cloud, or Hybrid cloud). Organizations are finding themselves using multiple public clouds (e.g., AWS, Azure, IBM Cloud) alongside private clouds to build innovative products or services that move their business forward. As a result of Public cloud adoption, cybersecurity is a concern. [...]