From the Summer 2023 Issue

Defense In Depth and DMZ WEB Server Deployment

Author(s):

Syed Taha Ahmed Jafri, Information Security Specialist,

Defense In Depth and DMZ

Introduction This article will discuss Defense in Depth (DID) in detail and minimum steps to securely deploy a Web server in DMZ for a FinTech 3-tier application. 3-TIER ARCHITECTURE In software engineering the methodology of 3-tier architecture is used to divide an application into logical boundaries. These boundaries are logical and their main benefit is … Read more

From the Winter 2021 Issue

What You Don’t Know About Ransomware Can be a Risk

Author(s):

Bradford P. Meisel, Esq., Associate, McElroy, Deutsch, Mulvaney & Carpenter, LLP (Co-author)

Diane D. Reynolds, Partner, McElroy, Deutsch, Mulvaney & Carpenter, LLP (Co-author)

Dr. Bernard A. Jones, CBCP, Assistant Professor, St. John’s University (Co-author)

Dr. Michael C. Redmond, PhD, Founder and CEO, Redmond Worldwide

Syed Taha Ahmed Jafri, Information Security Specialist,

Ransomware

Unfortunately, organizations continue to suffer debilitating impacts on operations due to both natural and human-made threats. One human-made threat, which continues to top the list of risks that organizations fear the most, is cybercrime. Cybercrime comes in many different forms, with ransomware specifically cited as the preeminent threat that impacts organizations worldwide. The severe ransomware … Read more