Category Archives: Certification

The Need-to-Know Terms of the General Data Protection Regulation

GDPR Terminology

We’ve compiled our recent series of terms pertaining to the General Data Protection Regulation (GDPR). GDPR goes into effect May 25th, and many organizations are still struggling to meet the compliance standards outlined in it. We’ll soon be posting blogs about GDPR for different industries, and roles as well as… Read more »

Need-to-Know GDPR Terminology for Compliance Success- Part 1

GDPR Terminology

GDPR from A-Z The GDPR is just a few months away, which means the countdown-crunch to compliance has begun. If you’re just beginning to learn about the General Data Protection Regulation, being implemented by the European Union in May, use this GDPR Terminology Cheat-Sheet (terms from A to D) to… Read more »

A Simple Journey to GDPR Compliance: Data Discovery

GDPR data discovery

A Simple Journey to GDPR Compliance: Data Discovery The EU’s GDPR imposes requirements on how organizations process both client data and internal company data. In order to comply, you must ensure that your company can easily locate and update personal data while ensuring that the data remains secure.  To do… Read more »

Secure your Enterprise Identities in the Cloud with Microsoft 365

Microsoft 365 Identity Security

Securing Enterprise Identities in the Cloud with Microsoft 365 Microsoft 365 was recently announced as Microsoft’s new, all-encompassing suite of cloud solutions. There are different licenses available, but today I want to focus on Microsoft 365 Enterprise which integrates Office 365 Enterprise, Windows 10 Enterprise, and Enterprise Mobility + Security… Read more »

Get College Credits for your Cyber Security Training

college credits for cyber security training

Get College Credits for your Cyber Security Training According to ISACA, there will be a global shortage of two million cyber security professionals by 2019. Meanwhile, cloud security firm CloudPassage found that only one in the top 36 computer science programs in the United States requires a security course for… Read more »

Why Train Employees in Cyber Security?

train employees in cyber security

Why Train Employees in Cyber Security? Cyber security is often an afterthought for businesses, and this can be detrimental. Many companies don’t provide cyber security awareness training to employees, nor their IT teams in the technical aspects. Those that do, rarely follow up that training going forward. Cyber security is… Read more »

YouTube Cyber Security Questions Answered: “Should I take CEH or OSCP first? What about CISSP?”

YouTube Cyber Security Questions

YouTube Cyber Security Questions Answered: “Should I take CEH or OSCP first? What about CISSP?” Our YouTube viewers are often actively working towards cyber security expertise and have great questions for us! Upon answering a question last week, I decided it may be nice to go into depth with some… Read more »

Hacking History: The Mentor and The Hacker Manifesto

The Mentor and The Hacker Manifesto

Hacking History: The Mentor and The Hacker Manifesto Loyd “The Mentor” Blankenship was a second-generation Legion of Doom hacker, riding the BBS wave and hacking the telephone networks along with every other 1980’s hacker. Much like other Generation X hackers, Blankenship was very young (in high school) and didn’t respond… Read more »

How to become a Cyber Security Expert

How to become a Cyber Security Expert The cyber security job market is severely lacking in qualified applicants. Our mission is to help fill this skills-gap with quality cyber security training for recognized certifications as well as up-to-date threats and defense techniques. It is clear, however, that certifications are not… Read more »

Train-Up or Hire-In? The Pros and Cons of IT Security Training

training or hiring

Train-Up or Hire-In? The Pros and Cons of IT Security Training Whether you’ve been hit with an attack, or are just seeing all the breaches happening in the news daily, you may be concerned that your security tools are just not going to cut it anymore. Along with data security… Read more »