Category Archives: DevOps

Secure your Enterprise Identities in the Cloud with Microsoft 365

Microsoft 365 Identity Security

Secure your Enterprise Identities in the Cloud with Microsoft 365 Microsoft 365 was recently announced as Microsoft’s new, all-encompassing suite of cloud solutions. There are different licenses available, but today I want to focus on Microsoft 365 Enterprise which integrates Office 365 Enterprise, Windows 10 Enterprise, and Enterprise Mobility +… Read more »

Drafting Cyber Security Policy for your Company

cyber security policy

Drafting Cyber Security Policy for your Company The aspects you need to cover when drafting or updating your company’s cyber security policy- from employee responsibilities to federal compliance policies. Drafting cyber security policy for your company can seem an overwhelming task. There is so much to cover and it all… Read more »

Why Train Employees in Cyber Security?

train employees in cyber security

Why Train Employees in Cyber Security? Cyber security is often an afterthought for businesses, and this can be detrimental. Many companies don’t provide cyber security awareness training to employees, nor their IT teams in the technical aspects. Those that do, rarely follow up that training going forward. Cyber security is… Read more »

Who’s responsible for the Cyber Security of your Company?

responsible for cyber security

Who’s responsible for the Cyber Security of your Company? Many companies hold IT solely responsible for online information privacy and security, but experts agree that this is not a sustainable security business model. In an interview with the Wall Street Journal, Former CIA and NSA Director, Gen. Michael Hayden, calls… Read more »

Women in Tech: National Cyber Security Organizations

National Cyber Security Organizations

Women in Tech: National Cyber Security Organizations After working with Women in Cyber Security (WiCyS) recently, as a sponsor of their yearly conference, I was curious about what other great organizations were making similar efforts to champion women in the information security and privacy field. As I began my search, I… Read more »

Train-Up or Hire-In? The Pros and Cons of IT Security Training

training or hiring

Train-Up or Hire-In? The Pros and Cons of IT Security Training Whether you’ve been hit with an attack, or are just seeing all the breaches happening in the news daily, you may be concerned that your security tools are just not going to cut it anymore. Along with data security… Read more »

How to become a CISO

CISO

How to become a CISO Browse our course library and get your career path started today! What is a CISO? CISO stands for Chief Information Security Officer. The CISO is part of a company’s C-suite, or senior-level executive board. CISOs are expected to focus on the maturity level of the… Read more »

Cyber Security: Still among the Biggest Challenges for Businesses

business challenges

Cyber Security: Still among the Biggest Challenges for Businesses The cyber landscape is becoming increasingly complex and concerning for businesses. Many are at a loss as to what to do. Many large corporations, government agencies and other institutions (especially in the health care and financial sectors) have been targets of… Read more »

Hacking History: LOD vs. MOD Part 2 [The Hacker Gang War]

Legion of Doom Masters of Deception

Hacking History: LOD vs. MOD Part 2 [The Hacker Gang War] Last week, I started the story of two of the most infamous hacker gangs of the 1980’s: the Legion of Doom and the Masters of Deception. The second part of this story gets a bit more ambiguous, considering the… Read more »

The Big Cyber Threats Breakdown: Types of Cyber Attacks

cyber threats types of cyber attacks

The Big Cyber Threats Breakdown: Types of Cyber Attacks Last year, I published a series breaking down various cyber threats: how they work, infamous case studies and how to defend yourself against them. In this post, I have compiled the entire list amounting to nine types of cyber-attacks. I’ve added… Read more »