A Tale of Two CryptosAn opinion about if an individual should invest in digital currencies. Advice on whether to invest in cryptocurrency (crypto) should be…Mar 28, 2022Mar 28, 2022
Ethical Hacking by Penetration TestingCybersecurity professionals face daunting challenges to protect system availability and network integrity. Almost weekly, media report…Mar 18, 2022Mar 18, 2022
White Paper — A Novel Blockchain Token to Return a New Normal in International Student ExchangeAbstractMar 15, 2022Mar 15, 2022
Deutsche Bank: Implementing BlockchainThis post reviews the approach taken by Deutsche Bank when implementing distributed ledger technologies (DLT) on a blockchain…Mar 14, 2022Mar 14, 2022
Threat Modeling in HealthcareThis post reviews three threat models, STRIDE, PASTA, and VAST, that can be used to mitigate damage caused by attacks, both external and…Mar 14, 2022Mar 14, 2022
Hospital Disaster Recovery PlanningBackground Disaster recovery (DR) planning comprises an essential component of an organization’s Business Continuity Plan and is initiated…Mar 14, 2022Mar 14, 2022
Blockchain’s Open-Source BenefitsOpen-source software is a mindset and distribution method rather than a pricing mechanism. During the 1980s, as personal computers became…Mar 14, 2022Mar 14, 2022