Category: Webpost_status

  • ***Please make sure to only use WEBSITE sources*** ***DO NOT USE BOOKS as sour

    ***Please make sure to only use WEBSITE sources*** ***DO NOT USE BOOKS as sources for this assignment*** In our reading this week (CISO Compass, chapter 13), Fitzgerald makes the case for two sets of forces impacting strongly the success of the teams and the organization a Cybersecurity leader may be building and growing: • Multi-generational…

  • Topic Authentication Vulnerability

    Topic Authentication Vulnerability Authentication is generally regarded as the major weak link for any security scheme. A large part of the problem is that authentication considerations have to cover a wide range of devices, from smartphones to “things” from the Internet of Things. Given the highly varied device landscape, what are some of the most…

  • Supply Chain Security Risks

    Topic 1: Supply Chain Security Risks The National Institute of Standards and Technology (NIST) notes that cybersecurity in the supply chain is not just an IT problem: it also involves vendors, continuity, transportation, and many other factors requiring careful coordination. Each of these factors has a technical aspect. What would you consider to be some…