Author Archives: Katherine Murphy

Get College Credits for your Cyber Security Training

college credits for cyber security training

Get College Credits for your Cyber Security Training According to ISACA, there will be a global shortage of two million cyber security professionals by 2019. Meanwhile, cloud security firm CloudPassage found that only one in the top 36 computer science programs in the United States requires a security course for… Read more »

Hacking History: Clifford Stoll and Operation Showerhead

Clifford Stoll

Hacking History: Clifford Stoll and Operation Showerhead- the first Honey Pot In 1986, an astronomer named Clifford Stoll, had is grant cut and started a new job in the Lawrence Berkeley Laboratory (LBL), as a systems manager. Near the beginning of his new role, his boss asked him to investigate… Read more »

Hacking History: The Morris Worm and Robert T. Morris Jr.

the Morris worm

Hacking History: Robert Tappan Morris Jr. Up to this point in our hacking history series, the figures have focused on decryption and then manual processes to intercept communications or gather information from other people’s systems. In this next installment of our series, the potential of hacking into networks and computers… Read more »

YouTube Cyber Security Questions Answered: “Should I take CEH or OSCP first? What about CISSP?”

YouTube Cyber Security Questions

YouTube Cyber Security Questions Answered: “Should I take CEH or OSCP first? What about CISSP?” Our YouTube viewers are often actively working towards cyber security expertise and have great questions for us! Upon answering a question last week, I decided it may be nice to go into depth with some… Read more »

#CyberHeadlines: When your VPN is out to get you

#CyberHeadlines: When your VPN is out to get you Nicholas Deleon, writer at Motherboard, posted an article last week about a cyber fraud that targeted him recently. The story is perplexing, and comically written, and is a fun read (I recommend it). Deleon’s speculative reasoning suggests that new legislation allowing… Read more »

#CyberHeadlines: Operation Cloud Hopper- APT10 Hacks Target MSPs

hacks target msps

#CyberHeadlines: Operation Cloud Hopper- APT10 Hacks Target MSPs A new report from the National Cyber Security Centre (NCSC), in conjunction with BAE systems and PwC, details what they refer to as “one of the largest ever sustained global cyber espionage campaigns”. Using custom malware and spear phishing, Chinese hacker group… Read more »

Hacking History: The Mentor and The Hacker Manifesto

The Mentor and The Hacker Manifesto

Hacking History: The Mentor and The Hacker Manifesto Loyd “The Mentor” Blankenship was a second-generation Legion of Doom hacker, riding the BBS wave and hacking the telephone networks along with every other 1980’s hacker. Much like other Generation X hackers, Blankenship was very young (in high school) and didn’t respond… Read more »

Cyber Security: Still among the Biggest Challenges for Businesses

business challenges

Cyber Security: Still among the Biggest Challenges for Businesses The cyber landscape is becoming increasingly complex and concerning for businesses. Many are at a loss as to what to do. Many large corporations, government agencies and other institutions (especially in the health care and financial sectors) have been targets of… Read more »

Hacking History: LOD vs. MOD Part 1. [The Gangs Form]

Legion of Doom Masters of Deception

Hacking History: LOD vs. MOD Part 1. [The Gangs Form] In the early 1980’s, around the same time the 414s and Chaos Computer Club formed, many hacker groups started popping up all around the world. One of the earliest of these groups was the Knights of Shadow. Hacker groups recruited… Read more »

Teaming up with the Women in Cybersecurity Conference

women in cybersecurity

Teaming up with the Women in Cybersecurity Conference The Women in Cybersecurity (WiCys) Conference is around the corner (March 31- April 1) and promises some must-attend events. With capture the flags and workshops in a broad array of topics (i.e. reverse engineering, applied cryptography, planning next career steps and business… Read more »