Monthly Archives: March 2017

How to become a Forensic Computer Analyst

how to become a forensic computer analyst

How to become a Forensic Computer Analyst Browse our course library and get your career path started today! What is a Forensic Computer Analyst? A Forensic Computer Analyst (or Forensic Computer Investigator) works with law enforcement and private entities to identify systems and networks which have been compromised from criminal… Read more »

#CyberHeadlines: Businesses Invest in Filling the Skills-Gap

#CyberHeadlines

Businesses Invest in Filling the Skills-Gap HealthDataManagement.com compared multiple reports which have been recently published about organizations combatting the growing skills-gap with spending increases in their data security endeavors. Looking at reports by Thales, Crowd Research Partners, the Center for Cyber Safety and Education as well as the 2017 Cybersecurity… Read more »

Hacking History: The 414s

the 414s

Hacking History: The 414s The 80’s Hacker Craze In the early 1980’s the internet and home-computer were relatively new and had yet to be accounted for, in the United States legal system. Innovation and progress moved faster than the bureaucratic system could keep up with, let alone predict. In 1983… Read more »

#CyberHeadlines: Cloudflare’s CloudBleed

#CyberHeadlines

CloudBleed, the Cloudflare Vulnerability In late February, Tavis Ormandy, Google security researcher, contacted Cloudflare, the web performance and security company, about a memory leak happening in their system due to a parser bug. Many companies, such as Salesforce, Uber and OK Cupid, use Cloudflare who touts Performance, Security Reliability and… Read more »

#CyberHeadlines: 1st Practical SHA-1 Collision Attack

#CyberHeadlines

The 1st Practical SHA-1 Collision Attack Researchers from Google, the Cryptology Group at Centrum Wiskunde and Informatica in Amsterdam, published a paper last week about the first practical collision attack for the cryptographic hash function SHA-1. The attack method entails the collision of two PDF files by obtaining the SHA-1 signature… Read more »

#CyberHeadlines: AWS Outage, Dridex Update, Boeing Faux-Pas

#CyberHeadlines

AWS Outage, Dridex Update, Boeing Faux-Pas A lot of big cyber security news happened at the end of February, here are some of the biggest stories, we thought you need to know about. Amazon Web Services Outage February 28th, Amazon’s oldest AWS server had an outage, taking many sites down… Read more »

How to become a Network Security Administrator

how to become a network security administration

How to Become a Network Security Administrator Browse our course library and get your career path started today! What is a Network Security Administrator? The Network Security Administrator (or Systems Administrator) is a jack-of-all-trades in the security sector. Ultimately, it’s the Network Security Administrator’s job to keep an organization’s network… Read more »