What Do Big Data Scientist Do?

Becoming a data scientist has become one of the most exciting jobs in information technology today. It is a job that is in high demand. People are curious about what it exactly is and what data scientists actually do. There is a misconception about what exactly the job of data scientist is. This is because unlike other jobs, there is no standard definition explaining this profession. Data scientists are often confused with data analyst and data engineers, but in reality, there is quite a lot separating these fields. A data scientist has knowledge and experience from different digital and [...]

SDLC Comparision: Agile vs DevOps

Agile and DevOps are often conflated and confused with each other. It’s often misunderstood where one stops and the other begins. While there are a lot of differences between the two, the short answer is that Agile is a Software Development Life Cycle that provides a methodology for delivering tech products and DevOps is a method to deliver those same technology products to those who need it. Agile When the Agile Manifesto was first written in 2001, it was a response to the waterfall-based methodologies. Waterfall approaches were heavy front-end specifications and hoping you covered everything. Inevitably, you didn’t. [...]

Technology Spotlight: Vulnerability Management and Penetration Testing

Vulnerability management (Blue Team), Penetration testing (Red Team) are like two sides of a coin, one without the other is incomplete. News Flash: When it comes to security, incomplete equals "at risk". We see this duality in every industry where assurance is required.  Such as in industrial design and testing. In the cyber world management must begin with assessing what the potential for damage to brand integrity will be should a breach occur. Loss of customer or public confidence? Loss of trade secrets? Leakage of Personally Identifiable Information? Once management embraces the danger a breach represents to their business, [...]

What Happens During a Cybersecurity Assessment?

When most people think of cybersecurity, they think of anti-virus and firewalls. While that is part of cybersecurity, it is equivalent to thinking of a tire or a windshield when thinking about an automobile. Cybersecurity is the comprehensive ability of an organization to identify, protect, detect, respond and recover from cyberincidents. These cyberincidents have the potential to damage brand integrity through data loss or leakage. Cybersecurity assessments are an important compoent to any greater cybersecurity strategy. This article discusses what happens in a cybersecurity asessment. A Cybersecurity Posture Assessment is standardized process used to define, evaluate, assess and document [...]

Cybersecurity Best Practices

People often tend to think of cybersecurity as only an IT function, such as network security, or like a firewall or having antivirus on a computer.  Cybersecurity is driven at the organization level. It is composed of culture, behavior, goals, priorities and then protections, procedures and verification. Cybersecurity best practices are much more than at the IT level. Cybersecurity starts at the top with the executives and trickle down to management. Management needs to articulate plans to the technical architects, engineers, analysts and tools.  On the executive level, cybersecurity needs to be a business strategy. In the IT ranks, [...]