Cybersecurity Empowerment: Risk Management from a Strength-Based Position
The Haight Bey approach to cybersecurity is based on a philosophy of empowerment instead of fear. We view the threat from a proactive perspective and
The Haight Bey approach to cybersecurity is based on a philosophy of empowerment instead of fear. We view the threat from a proactive perspective and
A small business qualitative cyber risk assessment typically goes something like this: Develop a list of things of value to the organization—assets—such as users, intellectual
If you’ve determined that your organization is subject to the DFARS/800-171 cybersecurity requirements for DoD contractors, you’ll want to conduct a security assessment to determine
Haight Bey & Associates provides “Cybersecurity Empowerment ℠” services to small- to medium-sized businesses, particularly US Defense contractors. This means we help organizations bootstrap a
From September 25-30 I attended the SANS Institute SEC560 Network Penetration Testing and Ethical Hacking training course in Baltimore, MD. This is my second SANS
During my internship from June to August 2017, my main project for Haight Bey & Associates LLC (HBA) was to configure a free network-monitoring tool
I started Haight Bey & Associates in 2014 after literally years of pipe-dreaming of the different ways I could generate an income for myself while
Adam Austin Cybersecurity Lead, Haight Bey & Associates September 2017 Since my mid-teens I’ve been keeping a journal. It’s up to three volumes now, filled
My name is Jim Lee and I’m currently entering my fourth-year as a computer-science undergraduate at UC San Diego. This past summer from June 2017
The latest revision of the DoD Federal Acquisition Regulation Supplement (DFARS, revised Oct 21, 2016) contains some new cybersecurity requirements for DoD contractors who process