Category

Insights
The following is my personal opinion in regards to whether or not companies are able o claim security by obscurity. To level set all users, this can be formally defined as the reliance on the secrecy of the design or implementation as the main method of providing security for a system or component of a system. I...
Read More
During the 18th Century, the Industrial Revolution led the complete transformation of our culture, society and our economics. You may not realize it right now, but we are smack in the middle of another Industrial Revolution. Our Revolution is primarily centered around the Internet of Things (IoT).  Projected to generate more than $2.5 trillion in...
Read More
The SANS six-step Incident Handling Methodology are preparation, identification, containment, eradication, recovery, lessons learned. According to SANS, preparation, identification and lessons learned phases are most affected by company size. In terms of planning for the long term, the steps I would take depends on the size of company.  The smaller the organization, the less formal...
Read More
The Software Development Life Cycle (SDLC) can be described as a phased process employed for software development that typically consists of the following phases: Design, Build, Testing, Release, Support. The SDLC can be implemented in two ways: Waterfall or Agile method. The Waterfall method follows that of traditional project management where all scope is agreed...
Read More
Since 3 years have gone by already, the following is my personal opinion on the infamous Ashley Madison Hack of 2015. Many families were affected by this hack as well. Therefore, I will attempt to be a bit more sensitive with this post. Background Ashley Madison is a online data service that encourages its users...
Read More
This post is a overview of the operating systems powered by Apple. I hope this information serves you well in your understanding of operating systems. Launched for consumers in 2001 by Apple, it was actually conceived much earlier and was the first ever successful graphical-based operating system. If any of you have heard of Steve...
Read More
This post is a quick overview of the operating systems powered by Microsoft at a high level. Introduced in 1985 by Microsoft, this operating system holds almost 90% of the operating system market share. Windows is commonly references with PC’s. You can usually find Windows in home computers, industrial facilities and commercial buildings. By a...
Read More
The following is an overview of Operating Systems. This is one of the most important topics in computer science and is worth reviewing at a granular level. I do recommend you read this post and let me know if you have any questions. In general, the operating system can be considered the most important software...
Read More
This article is to help readers understand the differences/similarities between XSS and CSRF attacks. These are attacks that are common in the application security realm. This information may be useful for a job interview one day. I hope you enjoy! The main difference between Cross-Site Scripting (XSS) and Cross Site Request Forgery (CSRF) is in...
Read More
By: Ravel Charles & Gillian Cowen | athenahealth Integration Design  For three days, over 250 global developers, designers, and entrepreneurs accepted the challenge to build something that would foster better health for their communities and the world. They were hacking healthcare at the first ever HLTH Hackathon at the Aria in Las Vegas. These hackers...
Read More
1 4 5 6 7 8 9