CSEC 670

Management Actions that Must Happen Prior to a Cyber Attack

Prior to any cyber attack, an organization should already have a solid crisis management plan and set of disaster...

Feb 26 · 1 min read >
cyber attack

Moving Target Defense (MTD)

Organizations continue to struggle with policies and processes to effectively secure their infrastructure to protect their information assets and...

Feb 18 · 13 min read >
Moving Target Defense

Three Must Have Security Policies In 2018

The nature of the Internet and worldwide connectivity has changed the traditional centuries old paradigm regarding proximity.  We now...

Feb 11 · 1 min read >
Cybersecurity Policies

Vulnerability Assessments

Vulnerability assessments can be a very effective way of gathering information on an organizations internal security posture. The purpose...

Feb 10 · 56 sec read >
Vulnerability Assessments

What are Advanced Persistent Threats?

Advanced Persistent Threats (APTs) are security threats that use advanced techniques to hide their attack from their target. They...

Feb 9 · 1 min read >
Advanced Persistent Threats

Just What Exactly is Cybersecurity Anyway?

The word Cybersecurity is thrown around so much these days it has almost become overused in many conversations. This...

Feb 1 · 1 min read >
Cybersecurity

What is an Asymmetric Threat?

The term asymmetric refers to an unequal balance or when thinking about threats, an unfair advantage to the perpetrator....

Feb 1 · 53 sec read >
Asymmetric Threat