Posts in infosec
The Importance of Information Security: Lessons Learned from the Code Spaces Breach

This breach had an extreme impact on not just Code Spaces customers, but on the future of Code Spaces itself.  Not only did a data breach occur, but data (and all associated backups) were deleted and not able to be restored.  This is an example of a worst-case scenario, and while it may not happen often, when it does it has dire consequences. 

Read More
Why IT Projects Fail... and How to Find Project Success

Unfortunately, the success rate of information technology projects is, quite simply, not very good.  In fact, some estimates place the failure rate for information technology projects at over fifty percent (Florentine, 2016).  Due to the high capital expenses, large amounts of time, and considerable staff expenses common to IT projects, these failures come with severe consequences for companies.

Read More
A Brief Introduction to Digital Forensics

As electronic devices and their associated digital storage are more commonplace than ever before, it is easy to see how their involvement in crime or other undesired events must be considered during any investigation.  For example, when considering bank fraud, it would literally be impossible to accomplish without leaving some digital traces.  For that reason, it is imperative that investigators have the appropriate tools, methods, and knowledge to gather digital evidence, present digital evidence in court, and prove that the evidence is authentic. 

Read More
Ethical Considerations for Deploying Face Authentication

After decades of use in a variety of governmental and commercial environments, face recognition technology recently found its way into mainstream consumer devices.  From Apple’s Face ID to Microsoft’s Windows Hello, face recognition technology provides a unique method of authentication that is difficult to replicate.  While the technology has reached a level of maturity for general use, some argue that the technology is far from being universally accessible.

Read More
Revisiting the Great Sony Hack of 2011

One such example of a company encountering the consequences of a large-scale data breach is that of Sony in 2011.  In April of 2011, hackers obtained personal information, including credit card numbers and bank routing information from over 100 million Playstation Network (PSN) users (Laudon & Laudon, 2016).  The breach had far-reaching negative outcomes, some of which that did not appear until years later. 

Read More
Wireless Security Basics - Auditing Wireless Networks

The introduction of wireless networking and mobile devices carries with it specific risks and threats that must be considered when planning an information technology audit. As Stallings and Brown (2012) note, chief among these inherent risks is the fact that wireless networks present three attack vectors not necessarily present in a traditional wired network: the wireless client, the wireless access point, and the transmission medium.

Read More
Promoting Ethical Behavior in Information Technology Teams

In today’s economy, a company’s capacity to behave ethically and operate in a socially responsible manner is critical to its long-term success.  No longer is it sufficient to merely remain profitable; with the advent of the internet and the associated improvement to communication, companies are often also measured on their overall social impact.  For this reason, it is imperative that businesses, and their IT departments in particular, understand the importance of ethics in the workplace. 

Read More
How To Create an On-Demand VM using Vagrant and VirtualBox

Learn how to create on-demand testing and development virtual machines using freely available, industry-standard tools: Vagrant and Virtualbox. The primary benefits of using a tool such as Vagrant are its integration with automation/configuration management tools and its online repository of pre-configured images

Read More