Risk analysis as it pertains to computer resources, is a process of determining potential fiscal cost of having one or more of the three elements(reliability,…
My education is as a Systems engineer (and is in my Blood 🙂 What is a systems engineer? Applied Mathematics as well as engineering.…
Kmart had an IT department and still got a malware breach with the credit card numbers stolen.
JPMORGAN SPENT $250 MIL DOLLARS ON SECURITY DEFENSE – STILL HACKED. http://oversitesentry.com/?p=614 http://oversitesentry.com/?p=606 The post that explains the number of scans per month ( a USENIX…
IT departments have too much to do They have to keep up with new technologies, all of the new security potential vulnerabilities are frequently too difficult…
My Kickstarter Project Link The Ebook will be available within 2 weeks from now Contact me if you are interested in the E-book If interested in this…
In the on air interview I discussed a kickstarter project on a book, but that did not go anywhere in time (as Stan Fine thought…
We perform the Alpha scan to perform the initial scans, and then use the information to perform penetration testing (or pentesting) with the Sigma scan to attack the site…
We are your network/Security shield. We defend your computer network and have done so for close to 20 years now – You will see our…
It is an old security methodology to review what is necessary in a Security Strategy: People = we know people can cause security holes,…