Category Archives: NICE

Drafting Cyber Security Policy for your Company

cyber security policy

Drafting Cyber Security Policy for your Company The aspects you need to cover when drafting or updating your company’s cyber security policy- from employee responsibilities to federal compliance policies. Drafting cyber security policy for your company can seem an overwhelming task. There is so much to cover and it all… Read more »

Hacking History: The Chaos Computer Club (CCC)

Chaos Computer Club

Hacking History: The Chaos Computer Club (CCC) The Chaos Computer Club (CCC) is the oldest hacking group (I would even say, oldest hacktivist group) known in history, but also brings us all the way to 1981. Before we go into the CCC’s history, let’s do a little catch up to… Read more »

How to become a Security Architect

How to become a Security Architect

How to become a Security Architect Browse our course library and get your career path started today! What is a Security Architect? A Security Architect’s main objective is to develop and test security tools and infrastructure in order to protect an organization’s network and systems. Security Architects need to be… Read more »

Hacking History: Rene Carmille

Rene Carmille and Nazi punch cards

Hacking History: Rene Carmille Moving away from Poland and England, there are still historical hackers to be found throughout WWII. One of the greatest heroes of the war was Rene Carmille, French Army General Comptroller. Rene Carmille is often also credited as “the first hacker” for his work, defying the… Read more »

Hacking History: Bletchley Park

Women of Bletchley Park

Hacking History: Bletchley Park Bletchley Park, known as one of Britain’s best-kept-secrets (until recently) was the home of the Government Code and Cypher School (GCCS) where codebreakers worked tirelessly to decipher Nazi codes during World War II. As mentioned in my last two posts of this series, Bletchley Park housed… Read more »

Women in Tech: Cyber Security- Vidya Sekhar

Women in Tech Women in Cyber Security

Women in Tech: Cyber Security- Vidya Sekhar As an educational service, we have been very interested in how to help correct the gender disparity associated with the tech industry, specifically in cyber security. We were pleased at both the insight and great advice Ravila White shared with us in our… Read more »

#CyberHeadlines: UC Awareness Training; D.C. Police Hit with Ransomware; What’sApp Privacy Suit

#CyberHeadlines

#CyberHeadlines: UC Awareness Training; D.C. Police Hit with Ransomware; What’sApp Privacy Suit UC Davis Talks about Training https://www.ucdavis.edu/news/cybersecurity-training-worth-repeating/ Recently, UC Davis got hit with a phishing attack. Dave Jones, a faculty member at UC Davis, used this case as encouragement for the required, annual UC cybersecurity awareness training. He points… Read more »

#CyberHeadlines: LeakedSource Server Confiscated

#CyberHeadlines

#CyberHeadlines: LeakedSource Server Confiscated LeakedSources Shuts Down LeakedSources, a popular site for amateur hackers, has allegedly had its server confiscated by U.S. law enforcement. PC World quotes users on HackForums.net who claim that any amateur hackers who paid for information from this site now has all of their personal info… Read more »

#CyberHeadlines: Phishing NATO

#CyberHeadlines

#CyberHeadlines: Phishing NATO Hackers Phished NATO with new Matryoshka Doll Reconnaissance Framework A new, layered approach of hacking has been employed upon NATO members. A report by Steve Ranger of ZDNet and Tech Republic put out a report, outlining their tactics today (January 31, 2017). Researchers who were targeted in… Read more »

Hacking History: The Enigma Machine

Enigma Machine

Hacking History: The Enigma Machine While this series is to be (mainly) about the figures who paved the way for hackers’ futures; the enigma machine requires a post of its own due to its sordid past. Aside from the Enigma Machine being a devise used for Nazi communication during World… Read more »