Author Archives: Bally

The Cloud Security Landscape

cloud security landscape

The Cloud Security Landscape At this point, you’ve definitely heard of the cloud. Everyone, especially businesses, is talking about moving to the cloud, and their concerns about the cloud security landscape. You already use cloud-based services such as Netflix, Spotify, and Amazon. However, like with most technologies, innovation precedes security,… Read more »

New FTC and IRS Scams to look out for

Summer Scams

New FTC and IRS Scams to look out for The FTC and IRS recently announced some summer scams which have been reported and what you can do to avoid and react to such events. Below we will outline each one and provide resources to ensure it doesn’t happen to you,… Read more »

Have I been Breached? 4 Signs to know when your Business is under Attack

have i been breached

Have I been Breached? 4 Signs to know when your Business is under Attack There is one major difference between how cyber security experts and everyone else think about cyber security: our expectations. While most people don’t assume there is an issue until one is presented to them, security experts… Read more »

WannaCry Ransomware Roundup

WannaCry ransomware

WannaCry Ransomware Roundup On May 12, 2017, a new ransomware strain, deemed “WannaCry” (WannaCrypt), was found by Malwarebytes (an anti-malware software company). Programmed to run in 27 languages, the ransomware’s first major infection, which grabbed all our attention, was when it hit the National Health Service of Britain (NHS). British… Read more »

Am I being hacked? 4 ways to tell if your system’s been compromised

am I being hacked

  Am I being hacked? 4 ways to tell if your system’s been compromised How do you tell if your computer or accounts have been hacked? Below are four, easy ways to tell if your system and/or accounts have been compromised. If you suspect your system or accounts are under… Read more »

Women in Tech: National Cyber Security Organizations

National Cyber Security Organizations

Women in Tech: National Cyber Security Organizations After working with Women in Cyber Security (WiCyS) recently, as a sponsor of their yearly conference, I was curious about what other great organizations were making similar efforts to champion women in the information security and privacy field. As I began my search, I… Read more »

How to become a Cyber Security Expert

How to become a Cyber Security Expert The cyber security job market is severely lacking in qualified applicants. Our mission is to help fill this skills-gap with quality cyber security training for recognized certifications as well as up-to-date threats and defense techniques. It is clear, however, that certifications are not… Read more »

How to become a CISO

CISO

How to become a CISO Browse our course library and get your career path started today! What is a CISO? CISO stands for Chief Information Security Officer. The CISO is part of a company’s C-suite, or senior-level executive board. CISOs are expected to focus on the maturity level of the… Read more »

The Big Cyber Threats Breakdown: Types of Cyber Attacks

cyber threats types of cyber attacks

The Big Cyber Threats Breakdown: Types of Cyber Attacks Last year, I published a series breaking down various cyber threats: how they work, infamous case studies and how to defend yourself against them. In this post, I have compiled the entire list amounting to nine types of cyber-attacks. I’ve added… Read more »

How to become an Information Security Analyst

How to become an Information Security Analyst

How to become an Information Security Analyst Browse our course library and get your career path started today! What is an Information Security Analyst? An information Security Analyst is typically an organization’s first line of defense against cyber-attacks and vulnerabilities, working with a team to manage access control and reporting… Read more »