Posts

Showing posts from October, 2024

Group Decision Methods

Group decision-making is widely used in organizations to solve problems. In this process, people work together, evaluate the situation, speculate on different options, and choose the most appropriate one. According to several authors, many approaches can be used in group decision-making, but the AHP and Delphi approaches are more structured and aim mostly at achieving agreement. This discussion will present these two methods, explaining their similarities and differences.  The Rand Corporation developed the Delphi technique in the 1940s. It is a systematic, interactive forecasting method that relies on a panel of experts. The process is done in several rounds. The first round involves sending questionnaires to the experts to seek their opinions, and the experts' identities are kept anonymous.  As the rounds progress, a facilitator collates all the responses and edits the answers they provided during the previous round, thus moving toward a conclus...

Artificial Intelligence in Cybersecurity: Trends and Effects of the Global Increase in the Frequency and Diversity of Cyber Attacks

Image
Artificial Intelligence in Cybersecurity: Trends and Effects of the Global Increase in the Frequency and Diversity of Cyber Attacks In today’s world, where data breaches and cybercrimes are the order of the day, cyberspace threats and scopes are shifting dramatically due to the presence of AI in modern-day attacks and its utilization by defensive measures. As educational institutions try to remain afloat alongside the ever-growing pool of sensitive materials and have data censorship placed on them, it becomes evident how expanding AI contacts will change the world for better and worse (Robert et al., 2024). The Technology: AI in Cybersecurity Cybersecurity has become a critical practice field, and AI has been the center pillar. On the one hand, attackers use AI to increase cyberattacks' sophistication, efficiency, and effectiveness (Robert et al., 2024). AI applications allow intruders to self-service multiple processes, circumvent security features, and create more realistic phish...

From Military Service to Cybersecurity: My Journey

From Military Service to Cybersecurity: My Journey Hello, my name is Tony Dennis . After 24 years of service as a Chief Warrant Officer Three (CW3) in the US Army, I retired with a career dedicated primarily to network security and information assurance at the enterprise level . These experiences laid the foundation for my current role as a cybersecurity engineer . In this position, I manage various security initiatives, including Microsoft 365 Security , Zero Trust Network Access (ZTNA) , Payment Card Industry Data Security Standards (PCI DSS) , privilege access management (PAM) , and incident response . Every day presents new challenges as I work to monitor and maintain security systems , safeguarding data and users from ever-evolving cyber threats . I am also on a unique journey as a doctoral student , working toward a degree to graduate in October 2026 , the same month I turn sixty . Several factors drive me toward this academic milestone: being the first in my family to attain s...