Guest Bloggers Archives - Phoenix TS https://www.phoenixts.com/blog/category/guest-bloggers/ The Training & Certification Experts Tue, 21 Jan 2020 19:42:37 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 Why Your Organization Needs To Measure Risks https://phoenixts.com/blog/measure-risks/ Mon, 19 Mar 2018 22:53:32 +0000 http://phoenixts.com/?p=97719 The importance and need to measure risks can’t be understated.  Whether it is performed in the initial Basis of Estimate (BOE) or kickoff meeting, risk identification is one of the first items a project team plans at the beginning of a project.   During the BOE or kickoff meeting, the project team will collaborate to identify […]

The post Why Your Organization Needs To Measure Risks appeared first on Phoenix TS.

]]>
Social Engineering: The Quick Facts https://phoenixts.com/blog/social-engineering-quick-facts/ Fri, 02 Mar 2018 19:44:15 +0000 http://phoenixts.com/?p=97683 The purpose of social engineering is for an attacker to utilize numerous tactics and manipulating individuals to divulge information, potentially critical, that could cause serious damage to an organization.  While there are many methods that can be utilized to gather material, it’s also important for workers and all organizations to be aware of their surroundings […]

The post Social Engineering: The Quick Facts appeared first on Phoenix TS.

]]>
Artificial Immune System Threat Detection and DTNs https://phoenixts.com/blog/artificial-immune-system-threat-detection-and-dtns/ Wed, 27 Jan 2016 17:04:48 +0000 http://phoenixts.com/?p=45418 Photo Credit: T Lymphocyte via NIAID cc Today we will examine the concept of the artificial immune systems. In one of my previous blog posts I discussed biomimicry and how it relates to information security. We will revisit biomimicry in the form of artificial immune systems. I will reveal how DTNs (disruption tolerant network/delay tolerant […]

The post Artificial Immune System Threat Detection and DTNs appeared first on Phoenix TS.

]]>
Incentive-Centered Design and Access Control https://phoenixts.com/blog/incentive-centered-design-access-control/ Thu, 14 Jan 2016 13:53:02 +0000 http://phoenixts.com/?p=45420 Photo Credit: Keys that no longer work, for places that no longer exist via hjl cc One of the major concerns of information security is access control. Access control is a concern because insider threats can violate the privacy of the owners of the information. Incentive-centered design approaches to security are fairly new and are […]

The post Incentive-Centered Design and Access Control appeared first on Phoenix TS.

]]>
Enhanced Information Security through Biomimicry https://phoenixts.com/blog/enhanced-information-security-through-biomimicry/ Tue, 29 Dec 2015 17:10:25 +0000 http://phoenixts.com/?p=45860 Photo Credit: 20150222_b via Jonathan McCabe cc Life can be thought of as a biological problem solver. When looking for innovative answers to some of the toughest security questions, many of the best solutions are found through observation of biological systems. The obvious examples include ant colonies, bee hives, and termites, but we can also […]

The post Enhanced Information Security through Biomimicry appeared first on Phoenix TS.

]]>
Hardware Security, Covert Channel Detection, and Malware https://phoenixts.com/blog/hardware-security-covert-channel-detection-and-malware/ Mon, 14 Dec 2015 14:20:57 +0000 http://phoenixts.com/?p=45130 Photo Credit: Interviews via Perspecsys Photos cc This article discusses hardware security, covert channels, and malware. Security has different domains. Typically when people think of information security they primarily focus on the software domain, but remember that the hardware domain is as important. Recent academic discoveries enhanced the capabilities of attackers (advanced persistent threats) to […]

The post Hardware Security, Covert Channel Detection, and Malware appeared first on Phoenix TS.

]]>
What are Advanced Persistent Threats (APTs)? https://phoenixts.com/blog/what-are-advanced-persistent-threats-apts/ Mon, 30 Nov 2015 14:11:45 +0000 http://phoenixts.com/?p=26312 Advanced persistent threats (APTs) use uncommon and sophisticated methods. Tactics such as social engineering, the use of zero-day exploits which leverage the element of surprise, and the tactic of stealth, make it very difficult to deal with. Discern the Attacker’s Goals to Classify Persistence “The term ‘persistent’ refers to the fact that the goal of […]

The post What are Advanced Persistent Threats (APTs)? appeared first on Phoenix TS.

]]>
Present and Future Landscape of Attack Tolerant Information Systems https://phoenixts.com/blog/present-and-future-landscape-of-attack-tolerant-information-systems/ Mon, 16 Nov 2015 13:46:23 +0000 http://phoenixts.com/?p=26306 Cybersecurity is difficult to achieve because the current environment favors offensive rather than defensive cyber operations. Because the balance favors offense, it is currently very cheap to do cyber attacks while simultaneously expensive to defend against them. Formal correctness is a part of the security paradigm of security by correctness which when done properly can […]

The post Present and Future Landscape of Attack Tolerant Information Systems appeared first on Phoenix TS.

]]>
Strides in Data Analysis at Baltimore Startup RedOwl https://phoenixts.com/blog/strides-in-data-analysis-at-baltimore-startup-redowl/ Tue, 19 Aug 2014 18:16:01 +0000 http://www.phoenixts.com/?p=5470 The “Most Innovative Company” of the year was founded right here in Maryland, Baltimore to be exact. The homegrown RedOwl Analytics is one of the many companies to join the throng of new tech startups in the area, including ZeroFOX and Virtru. The company received numerous accolades recently for their unique approach to data analysis for […]

The post Strides in Data Analysis at Baltimore Startup RedOwl appeared first on Phoenix TS.

]]>