Search results forcorporate

How To Perform Heuristics Evaluation On A Website?

H

Every User Experience Researcher in the world gets the request of performing a Heuristic Evaluation at least once in their lifetime. But it is not always clear if the requester knows precisely about this process of evaluation. What happens is, they hear a word in trend, and they request it. But before you dive right into the heuristics evaluation of the website, you need to be aware of what it is...

Useful WordPress Plugins You Probably Didn’t Know About

U

WordPress is one of the most popular, efficient ways to develop a fully-functional, beautiful website. WordPress add-on products and services are also highly decentralized. Developers are constantly producing plugins, or stand-alone software that can be easily incorporated into a WordPress website and provide it with a specific functionality. Adding new plugins to your WordPress website can...

Is Your Organization Using Evidence-Based Decision Making?

I

This is post 4 of 7 in the series “Decision Management Systems” Poor Decisions Impacted by Bias in Software Development Organizational Culture Changes and Impacts on the Individual & Decision Making Using Data Analytics to Improve Heath Care Is Your Organization Using Evidence-Based Decision Making? Exploratory Data Analysis with Watson Analytics Simple Predictive Modeling with...

Organizational Culture Changes and Impacts on the Individual & Decision Making

O

This is post 2 of 7 in the series “Decision Management Systems” Poor Decisions Impacted by Bias in Software Development Organizational Culture Changes and Impacts on the Individual & Decision Making Using Data Analytics to Improve Heath Care Is Your Organization Using Evidence-Based Decision Making? Exploratory Data Analysis with Watson Analytics Simple Predictive Modeling with...

United States Defense Contractors and Cybersecurity Challenges

U

In the United States, a sizable amount of the overall federal budget is allocated to defense spending. The 2018 Defense Budget was signed into law on December 12, 2017, by President Trump, which authorized just under $700 billion in defense spending (Blankenstein, 2017). In contrast to just a few years ago where the fiscal year defense spending was set at $593 billion, the amount of money set...

Three Must Have Security Policies In 2018

T

The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity.  We now see threats from all parts of the global. What are three cybersecurity policies for a firm that would mitigate risks for cybersecurity attacks at the global level? Cybersecurity threats continue to rise year after year and the problem continues grow due to the...

Sketching out your Perfect Website

S

You’ve decided it’s time to start solidifying ideas for your ideal website. You have no doubt spent countless hours in the planning phase identifying your target audience, design considerations, and of course you have a solid idea of your overall content strategy. If you haven’t, then do yourself a favor and take a look at The Complete Guide to Building Your Personal Brand, What...

Forensics in Business Continuity Planning

F

This is post 10 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...

DNS Rebinding and Intrusion Detection with Contextual Signatures

D

This is post 10 of 10 in the series “Intrusion Detection” TCP Congestion Control Installing Wireshark on Mac OS X (Yosemite) What are Rogue Access Points? Two Common Router Security Threats Modern Application Frameworks, Legacy Browsers and Security Implications What are Covert Channels? Mobile Considerations in Network Security Architecture Common Bluetooth Vulnerabilities to be...

Common Bluetooth Vulnerabilities to be Aware of

C

This is post 8 of 10 in the series “Intrusion Detection” TCP Congestion Control Installing Wireshark on Mac OS X (Yosemite) What are Rogue Access Points? Two Common Router Security Threats Modern Application Frameworks, Legacy Browsers and Security Implications What are Covert Channels? Mobile Considerations in Network Security Architecture Common Bluetooth Vulnerabilities to be Aware...

Mobile Considerations in Network Security Architecture

M

This is post 7 of 10 in the series “Intrusion Detection” TCP Congestion Control Installing Wireshark on Mac OS X (Yosemite) What are Rogue Access Points? Two Common Router Security Threats Modern Application Frameworks, Legacy Browsers and Security Implications What are Covert Channels? Mobile Considerations in Network Security Architecture Common Bluetooth Vulnerabilities to be Aware...

Top 7 Best web hosting services for 2018

T

Web hosting is the backbone of a website. It is crucial to the success of a blogger, business, and the website. A poor web hosting firm will have big downtimes. Because of poor infrastructure, the network latency will be high and your site will rank below faster websites in the search engines. Web hosting services are of three types, shared, VPS, dedicated, and cloud. The shared hosting plans are...

Bluehost vs Hostmonster vs JustHost (2018)

B

People are often confused in choosing a hosting service for their sites. On the internet, you will find details on 100s of web hosting companies. Yesterday, one of our readers dropped me an email to know which is the best hosting among Bluehost, Justhost, and HostMonster. The reader was confused because the plans and features offered by the companies are almost the same. I have shared a...

Operating Systems Security: Protection Measures Analysis

O

The Internet has brought us a wealth of conveniences and everyday tools that we could not live without and more importantly a dependency that we cannot break. In the workplace the Internet has become a part of our day to day lives. We rely on instant communication with our co-workers, friends and colleagues as well as access to a multitude of information at our fingertips. Children from younger...

Classes I Teach

C

I’ve been teaching at the University of Maryland University College for just over a decade. Below are the classes I am currently teaching or will be teaching in the upcoming semester. For more details on these classes including schedule and syllabus see UMUC Schedule of Classes. Current 2020/2021 School Year CMST 388 Fundamentals of JavaScript | 3 Credits Prerequisite: CMST 386...

FSW and Winter Terms

F

The purpose of this meeting was to finalize the data-entry sections of the system by further describing functionality specifically on non-expedition semesters.  Non-expeditions were discussed both as FSW / Winter term as well as other subject areas or strands of the curriculum delivered in parallel to expeditions.  The majority of this meeting focused on refining prototype 3 further by improving...

Workplace Monitoring and Blocking Software

W

This is post 18 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...

Cultural Values and Moral Legitimacy

C

This is post 6 of 18 in the series “Human Aspects in Cybersecurity” Challenges Policy Makers face to Counter Cybercrime Cybercrime vs Traditional Crime Risks, Threats and Vulnerabilities Security Policies Cost and Challenges with E-Government Cultural Values and Moral Legitimacy One audit standard fits all? Mobile Security Will the Mandiant Report Raise Public Awareness? Ethical vs...

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me