Open in app

Sign In

Write

Sign In

Brian Russel Davis
Brian Russel Davis

948 Followers

Home

About

Jul 7, 2020

Basic Misconceptions of Security In Privacy by Design (PbD) and Privacy Enhancing Technologies (PETS)

Privacy by Design (PbD) and Privacy Enhancing Technologies (PETS) as a practice seems to be very focused on the creation of security policy and law. This way of viewing security has many advantages because there is a clear void in modern policy and legislation as it relates to security. …

Privacy By Design

3 min read

Basic Misconceptions of Security In Privacy by Design (PbD) and Privacy Enhancing Technologies…
Basic Misconceptions of Security In Privacy by Design (PbD) and Privacy Enhancing Technologies…
Privacy By Design

3 min read


Jul 7, 2020

Enforcing Stringent Government Policies to Tackle Global Cyber Security Challenges

Sophisticated cyber-attacks and data breaches are external security attacks in the attempt to either disrupt a computer system or get hold of sensitive information. The internet suffered its first major sophisticated cyber-attack in 2013 when Evernote suffered a significant data breach exposing over 50 million encrypted passwords, emails, and usernames…

Government Innovation

4 min read

Enforcing Stringent Government Policies to Tackle Global Cyber Security Challenges
Enforcing Stringent Government Policies to Tackle Global Cyber Security Challenges
Government Innovation

4 min read


Jul 5, 2020

3 Practical Tips To Resolve Known Threats In An Organization

One of the most common hindrances of the war against cyberattacks in most organizations is the unwillingness of the management to release the requisite funds for investment into cybersecurity. The funding loophole is one of the primary reasons 43% of cyberattacks are targetted at SMEs. The trick is that these…

Cybersecurity

4 min read

3 Practical Tips To Resolve Known Threats In An Organization
3 Practical Tips To Resolve Known Threats In An Organization
Cybersecurity

4 min read


Jul 5, 2020

How To Set Up A Live Technology Definition Database (LTDD)

In 2019 DEFCON, U.S. Representative, Ted Lieu (D-CA), said that the United States is not ready for a severe cyberattack. This was a strong statement noting that it could trigger some malicious people to try their luck to infringe upon the U.S. cyberspace. Since then, many groups have proposed all…

Cybersecurity

11 min read

How To Set Up A Live Technology Definition Database (LTDD)
How To Set Up A Live Technology Definition Database (LTDD)
Cybersecurity

11 min read


Jul 3, 2020

Are Autofill Password Managers Safe?

Password managers are the new defense against cyber-attacks. These virtual managers generate and store secured passwords for different online accounts. But, it’s not easy choosing the right password manager to trust with your online passwords when they are many of them available. While this innovation is a thoughtful development, there…

Password Management

4 min read

Are Autofill Password Managers Safe?
Are Autofill Password Managers Safe?
Password Management

4 min read


Jul 2, 2020

The Dangers of Vehicle to Vehicle (V2V) Communication

Technology is changing our lives every day. Everything is changing, from how we communicate, do business, and recently how we drive. Connected vehicles are about to improve the day-to-day driving experience. These vehicles share mobility and safety information to enhance road safety and improve the driving experience. The information shared…

V2v Technologies

5 min read

The Dangers of Vehicle to Vehicle (V2V) Communication
The Dangers of Vehicle to Vehicle (V2V) Communication
V2v Technologies

5 min read


Jun 30, 2020

The Benefits and Challenges of Creating Legal Definitions for Malware

Defense strategies in most organizations generally anticipate that an attacker will make some changes to the files on a system, create a log of activity that can be detected by a SIEM (Security Information and Event Management software), trigger some other type of file, or log-based vector. However, fileless malware…

Malware

23 min read

The Benefits and Challenges of Creating Legal Definitions for Malware
The Benefits and Challenges of Creating Legal Definitions for Malware
Malware

23 min read


Jun 28, 2020

How To Build A Secure Browser For Organizations

The most vulnerable part of most organization’s network infrastructure is their browser. This is because it is a gateway to major attacks, primarily through malicious websites. This is also true for a government organization such as NASA. Network Security and Endpoint Security generally both depend heavily on the concept of…

Chromium

14 min read

How To Build A Secure Browser For Organizations
How To Build A Secure Browser For Organizations
Chromium

14 min read


Jun 28, 2020

How To Build A Secured Access Model For A Network Infrastructure

If there is anything that organizations must take very seriously, then it must be the control of confidential leaks. Leaks occur mainly when there is unauthorized access to the files and documents. …

Access Control

18 min read

How To Build A Secured Access Model For A Network Infrastructure
How To Build A Secured Access Model For A Network Infrastructure
Access Control

18 min read


Jun 22, 2020

A Review of DUO’s Two-Factor Authentication System

A recent Stratecast study shows that a massive 22% of social media users have been victims of one or more security-related issues. The major targets have been users of Yahoo, Facebook, Google, and several other social media platforms. This goes further to say that the days of trusting your online…

Duo

6 min read

Two-Factor Authentication System
Two-Factor Authentication System
Duo

6 min read

Brian Russel Davis

Brian Russel Davis

948 Followers

Socially Aware Data Science and CyberSecurity Engineering Leadership

Following
  • MIT Media Lab

    MIT Media Lab

  • Stephen Muskett, M.S.Ed

    Stephen Muskett, M.S.Ed

  • Shereese Maynard

    Shereese Maynard

  • Jason Fried

    Jason Fried

  • Google Walkout For Real Change

    Google Walkout For Real Change

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech