Prepared: May 13th, 2021 & Published May 17th, 2021 Below is my personal analysis of the executive summary. On May 12th, President Biden signed an…
The Changing Threatscape within Cyberspace
The modern battlespace is no longer merely guerrilla warfare. It’s the unknown cyber adversary that we cannot define that targets our most valuable infrastructures and…
Everyone wants YOUR Data: Where does it go and what is it used for?
Acquisition of your personal data: How and why do businesses collect your data? As the internet and technology grow, so does the need for capturing…
The CFAA, Arron’s Law, and Supreme Court Case for Nathan Van Buren: How Do They All Connect?
Law falls within three broad categories: criminal, civil, and administrative law. All three interact to form the complex web of the United States judicial system.…
Cloud Computing & SaaS: What You Should Know
Cloud Computing, it is incredible, right? It provides users with unlimited scalability, collaboration efficiency, and reduced IT cost. Furthermore, it has a positive impact on…
A Must-Read for Anyone New or Seeking a Career in Cybersecurity
Has anyone ever heard of an entry-level cybersecurity position? The answer is NO because these positions are golden unicorns – they don’t exist. Any position…
The Future: 5G
As the world progresses, it is only right that the network which connects us all does as well. The long-awaited fifth-generation mobile network has revolutionized…
Cyber Access Control & DDoS Attacks
Access control is a security process that regulates a user’s ability to connect to different systems or networks. While our accessibility is increased through cyber…
COVID-19 Impacts on Cybersecurity Conferences
To be frank, 2020 has become a train-wreck. Nobody could have predicted that 2020 would turn out the way it has, the least of them…