On this page you will find resources related to Cybersecurity and the wide range of topics that fall under this category. In my current role, I work as a contractor to the U.S. Federal Government as the IT Operations & Cyber Security Manager and hold a Top Secret security clearance. The agency I work for has an essential national security mission and a presence across the United States. In my role I become involved in digital forensics, incident response, malware reverse-engineering, vulnerability management, security engineering, network security, purchasing, budgeting, metric development, and other technical and administrative cybersecurity functions.
I received a significant amount of feedback from my recent post on how to setup parental controls with iOS 10 (available here), so I decided to follow on with another post on how to setup parental controls with Windows 10. While Microsoft has had some good parental control features with Windows 7, when Windows […]
I have discussed here and here many of the dangers that kids face when trying to navigate technology and the Internet and some ideas for parents on how to mitigate these risks. Parents have several choices available to them for parental controls on iOS devices and for this post, I tried several of the […]
If I were to ask you to install an exterior door in your child’s bedroom and told you that this door could not have any locks, alarms, or other security, how would you react? Most people would be uncomfortable with an unlocked door anywhere in their house and especially in their child’s room. How […]
Bring Your Own Device (BYOD) refers to allowing end users the ability to use their own personal mobile devices (e.g., phones, tablets, laptops, etc.) to conduct business instead of having a corporate device issued to them. BYOD is often seen as a cost savings and a step toward a “21st Century Workforce” by executives. […]
A classified spillage (commonly referred to as a spill) incident occurs when information is transmitted, processed, or stored on an information system that is not accredited to contain that level of information. Usually, this occurs when a classified document (confidential, secret, top secret, etc.) is created, stored, or emailed on unclassified systems or networks. […]
As a cybersecurity professional I get frequent questions from people who want to know how to keep their personal or business data secure. While it is true that the tools and techniques used by hackers are getting more sophisticated, the reality is that most breaches, even the very large and highly publicized breaches, could […]
The Office of Personnel Management (OPM) data breach takes cyberattacks against the United States to a new level. The motivation of the cybercriminals responsible for the OPM breach was not financial or hacktivism, but purely intelligence gathering. For context, the OPM is responsible for conducting security clearance investigations for many federal agencies and this […]