College eSports – A Parent’s Perspective

“It’s a Thing Now.”  If I had a nickel for every time I’ve said those words in the last few months, I’d have a big stack of nickels. It would not, however, be a big enough stack to equal the scholarship my son is receiving to play video games in college. My son will be entering the University of Missouri for the Fall 2019 semester as a member of their inaugural esports program. He will be playing on their Overwatch team. Over the past year, I have evolved from telling him to spend less time playing games to realizing he’s [...]

SDLC Comparision: Agile vs DevOps

Agile and DevOps are often conflated and confused with each other. It’s often misunderstood where one stops and the other begins. While there are a lot of differences between the two, the short answer is that Agile is a Software Development Life Cycle that provides a methodology for delivering tech products and DevOps is a method to deliver those same technology products to those who need it. Agile When the Agile Manifesto was first written in 2001, it was a response to the waterfall-based methodologies. Waterfall approaches were heavy front-end specifications and hoping you covered everything. Inevitably, you didn’t. [...]

Top Qualities of an Effective IT Leader

Information technology and software development requires incredible creativity and vision. A leader in Information Technology has to really push for excellence and value in their products to make sure that they make a mark on the world. This article digs into some common characteristics we see in strong IT leaders. Having a Vision An IT leader needs to have a clear vision in order to lead his or her company in to the future. That cannot be compromised because tech is a field that is more concrete and less abstract than other fields like social sciences. Hence, the vision [...]

Technology Spotlight: Vulnerability Management and Penetration Testing

Vulnerability management (Blue Team), Penetration testing (Red Team) are like two sides of a coin, one without the other is incomplete. News Flash: When it comes to security, incomplete equals "at risk". We see this duality in every industry where assurance is required.  Such as in industrial design and testing. In the cyber world management must begin with assessing what the potential for damage to brand integrity will be should a breach occur. Loss of customer or public confidence? Loss of trade secrets? Leakage of Personally Identifiable Information? Once management embraces the danger a breach represents to their business, [...]

What Happens During a Cybersecurity Assessment?

When most people think of cybersecurity, they think of anti-virus and firewalls. While that is part of cybersecurity, it is equivalent to thinking of a tire or a windshield when thinking about an automobile. Cybersecurity is the comprehensive ability of an organization to identify, protect, detect, respond and recover from cyberincidents. These cyberincidents have the potential to damage brand integrity through data loss or leakage. Cybersecurity assessments are an important compoent to any greater cybersecurity strategy. This article discusses what happens in a cybersecurity asessment. A Cybersecurity Posture Assessment is standardized process used to define, evaluate, assess and document [...]