IoT security risks within the U.S. Defense Industrial BaseThe following is a research report I developed as part of my graduate studies. I analyze the cybersecurity risks presented by the Internet…Jan 15, 2023Jan 15, 2023
Timeline of a typical ransomware attackRansomware has become somewhat of a buzz word. One of those flashy cyber-y words where, while the average end user may understand what…Oct 26, 2022Oct 26, 2022
Hardening Windows DefenderIn cybersecurity, to “harden” a system means to lock down the configuration of that system as to reduce its susceptibility to attacks. This…Sep 23, 2022Sep 23, 2022
Leveraging User Account Control to restrict administrative privielgesAdministrative privileges are a key target for hackers. Once they have landed within your environment, one of their first courses of action…Sep 9, 2022Sep 9, 2022
What is CMMC?If you are connected with me on LinkedIn, you may have noticed that I talk a lot about this thing called “CMMC”. Whether you are working in…Sep 4, 2022Sep 4, 2022
Five things I’ve learned working as a cybersecurity engineer (so far)Working in the cybersecurity field has brought about many new experiences and unique challenges. This is a very diverse field, and the…Sep 1, 20221Sep 1, 20221
My path into cybersecurityEveryone’s cybersecurity journey looks different. This is a notoriously difficult field to “break into”, and that is for a number of…Aug 27, 2022Aug 27, 2022