AuthorIan Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Useful WordPress Plugins You Probably Didn’t Know About

U

WordPress is one of the most popular, efficient ways to develop a fully-functional, beautiful website. WordPress add-on products and services are also highly decentralized. Developers are constantly producing plugins, or stand-alone software that can be easily incorporated into a WordPress website and provide it with a specific functionality. Adding new plugins to your WordPress website can...

Simple Predictive Modeling with Watson Analytics

S

This is post 6 of 7 in the series “Decision Management Systems” Poor Decisions Impacted by Bias in Software Development Organizational Culture Changes and Impacts on the Individual & Decision Making Using Data Analytics to Improve Heath Care Is Your Organization Using Evidence-Based Decision Making? Exploratory Data Analysis with Watson Analytics Simple Predictive Modeling with...

JavaScript Conditional Statements

J

This is post 3 of 11 in the series “Bitesize JavaScript” Bitesize JavaScript is a series of short lessons covering fundamental coding concepts. The goal is to quickly introduce you to the language and provide you with enough information to begin exploring the concepts in more depth. Each lesson is designed take a short amount of time to digest new topics and then apply them through...

Exploratory Data Analysis with Watson Analytics

E

This is post 5 of 7 in the series “Decision Management Systems” Poor Decisions Impacted by Bias in Software Development Organizational Culture Changes and Impacts on the Individual & Decision Making Using Data Analytics to Improve Heath Care Is Your Organization Using Evidence-Based Decision Making? Exploratory Data Analysis with Watson Analytics Simple Predictive Modeling with...

Is Your Organization Using Evidence-Based Decision Making?

I

This is post 4 of 7 in the series “Decision Management Systems” Poor Decisions Impacted by Bias in Software Development Organizational Culture Changes and Impacts on the Individual & Decision Making Using Data Analytics to Improve Heath Care Is Your Organization Using Evidence-Based Decision Making? Exploratory Data Analysis with Watson Analytics Simple Predictive Modeling with...

Using Data Analytics to Improve Heath Care

U

This is post 3 of 7 in the series “Decision Management Systems” Poor Decisions Impacted by Bias in Software Development Organizational Culture Changes and Impacts on the Individual & Decision Making Using Data Analytics to Improve Heath Care Is Your Organization Using Evidence-Based Decision Making? Exploratory Data Analysis with Watson Analytics Simple Predictive Modeling with...

Organizational Culture Changes and Impacts on the Individual & Decision Making

O

This is post 2 of 7 in the series “Decision Management Systems” Poor Decisions Impacted by Bias in Software Development Organizational Culture Changes and Impacts on the Individual & Decision Making Using Data Analytics to Improve Heath Care Is Your Organization Using Evidence-Based Decision Making? Exploratory Data Analysis with Watson Analytics Simple Predictive Modeling with...

Poor Decisions Impacted by Bias in Software Development

P

This is post 1 of 7 in the series “Decision Management Systems” Poor Decisions Impacted by Bias in Software Development Organizational Culture Changes and Impacts on the Individual & Decision Making Using Data Analytics to Improve Heath Care Is Your Organization Using Evidence-Based Decision Making? Exploratory Data Analysis with Watson Analytics Simple Predictive Modeling with...

Systems Integration Demystified

S

This post contains affiliate links. If you click through and make a purchase, I may receive a commission (at no additional cost to you). As an Amazon Associate I earn from qualifying purchases. This helps support the blog and allows me to continue to make free content. Thank you for your support! One of the benefits of working at a large organization is the opportunity to work with a considerable...

Infrastructure Options for Hosting Multiple Drupal Sites

I

A project I was recently working on had in place a cloud-based infrastructure that was designed to support a single installation of the Drupal CMS running in Amazon Web Services (AWS). This infrastructure included an auto-scaling setup with load balancers hosting a ‘cache’ layer and an ‘application’ layer that hosted the Drupal CMS. On the backend tier, an AWS Relational...

United States Defense Contractors and Cybersecurity Challenges

U

In the United States, a sizable amount of the overall federal budget is allocated to defense spending. The 2018 Defense Budget was signed into law on December 12, 2017, by President Trump, which authorized just under $700 billion in defense spending (Blankenstein, 2017). In contrast to just a few years ago where the fiscal year defense spending was set at $593 billion, the amount of money set...

SSL Labs Rating Woes

S

I was recently notified that one of the sites I support was getting a ‘C’ rating on SSL Labs. It turned out that there were three main issues that needed to be resolved. Two out of the three were relatively easy to find via the SSL Labs documentation, which required simple fixes to the ssl.conf file. This server is vulnerable to the POODLE attack. If possible, disable SSL 3 to...

Management Actions that Must Happen Prior to a Cyber Attack

M

Prior to any cyber attack, an organization should already have a solid crisis management plan and set of disaster recovery precautions in place. In addition to this, a risk analysis should be carried out involving a holistic approach and careful investigation of information systems and the overall environment. The purpose of such an analysis is to evaluate all endpoints that could potentially...

Moving Target Defense (MTD)

M

Organizations continue to struggle with policies and processes to effectively secure their infrastructure to protect their information assets and intellectual property. In recent years, we have seen the increase of cyber-attacks and breaches to the point that they have become common news worldwide. As systems have grown in complexity with increased capacity to store large amounts of data, so to...

Three Must Have Security Policies In 2018

T

The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity.  We now see threats from all parts of the global. What are three cybersecurity policies for a firm that would mitigate risks for cybersecurity attacks at the global level? Cybersecurity threats continue to rise year after year and the problem continues grow due to the...

Vulnerability Assessments

V

Vulnerability assessments can be a very effective way of gathering information on an organizations internal security posture. The purpose is to accumulate data on any weaknesses revealed that should be proactively mitigated to prevent exploitation. There are a number of tools that can be used to carry out vulnerability assessments. Typically, a software-based tools are used to scan a selected...

What are Advanced Persistent Threats?

W

Advanced Persistent Threats (APTs) are security threats that use advanced techniques to hide their attack from their target. They are commonly used to target specific information in high-profile companies and governments. APTs usually follow a long-term strategy of attack in order to gather information from the breached system. There have been many examples of APTs over the years targeting well...

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me