Traditionally, paper ballots have been used in elections in the United States. This project explores the security challenges associated with the deployment and use of …
The Mozambique National Cybersecurity Strategy does not elaborate a governance framework, thus, this paper looks at two essential questions: (1) what governance model should the …
The paper provides design and security considerations for Software-Defined Wide Area Network (SD-WAN) transformation from a traditional Multi-Protocol Label Switching (MPLS) WAN architecture. The rapid …
As the information security discipline continues to mature, we can draw on some of the lessons learned by the software development community. The dawn of …
This paper seeks to explore the challenges and the impact of a fragmented vendor risk assessment process across the financial industry. This is an important …
It's time to think seriously about creating legal definitions that would classify certain types of code as digital weapons. Our current regulation is weak and …
The paper is an examination of policy and technical solutions for the problem of maintaining the security of consumer devices and applications while providing mechanisms …
This paper explores the questions about whether we can trust security ratings and how we should use them. My approaches are, (1) describing traditional and …
The human factor is a crucial element for cybersecurity. One of the ways the cyber attackers are successfully exploiting our systems is by manipulating innocent …
To remain both competitive and compliant, organizations need consistent approaches for how to understand and consume data, what to collect, and how to manage it. …
Cybersecurity planning remains the purview of a few high-cost experts, but urgently needs to be available to the many non-expert managers of small-to-medium businesses (SMBs) …
Physicians in the United States are under the dual regulatory pressure of HIPAA compliance as well as economic pressure associated with free market choice that …
Phishing emails are the single most significant attack vector facing consumers and businesses today. Companies routinely report on metrics that do not adequately define their …
With the influx of online services offered at various levels of state government, citizen personal information is increasingly stored in various identity repositories associated with …
Each of the states are working towards improving their cyber incident responses but are not collaborating as much as needed. There are many efforts that …
This paper explores several use cases where human microchipping is enabling humans and businesses to interact with their digital surroundings faster and more efficiently in …
This guide aims to be a valuable place for in-house counsel to go to help them understand and address cybersecurity concerns. In-house counsel does not …
Technology brought incredible convenience to nearly every aspect of our lives. Means of communication, transportation, entertainment, and even exercise is very different. Innovation came with, …