Jacob DJ WilsonEstablishing an Acceptable Use Policy for AIA Step-by-Step Guide to Crafting an Effective AI Usage PolicyAug 31Aug 31
Jacob DJ WilsonShared Responsibility of Security Controls: Battling Account Takeovers TogetherIn our hyperconnected world, online services are woven into the tapestry of our daily lives. But with great convenience comes great assumed…Jan 161Jan 161
Jacob DJ WilsonBiden’s National Cybersecurity Strategy will hold Software Companies liable for defectsIt has been nearly two weeks since the Office of the National Cyber Director has released a National Cybersecurity Strategy grouped into…Mar 14, 2023Mar 14, 2023
Jacob DJ WilsonAccount Takeover (ATO) Maturity ModelThe introduction of a financial fraud maturity model allowing organizations to assess preventative capabilities of an account takeover. The…Feb 14, 2023Feb 14, 2023
Jacob DJ WilsonHello World!Another introduction to the cybersecurity community and a commitment to explore the journalist collective we now know as Medium.Mar 29, 2022Mar 29, 2022