Category Archives: Hacking

GDPR Day Has Commenced

GDPR day

GDPR Day has commenced May 25th is finally upon us, which means GDPR day has commenced. Many companies are likening GDPR to the dreaded Y2K we faced at the end of the last millennium.  Sure, it is true that they do share a sense of major consequences if requirements aren’t… Read more »

Need-to-Know GDPR Terminology for Compliance Success- Part 1

GDPR Terminology

GDPR from A-Z The GDPR is just a few months away, which means the countdown-crunch to compliance has begun. If you’re just beginning to learn about the General Data Protection Regulation, being implemented by the European Union in May, use this GDPR Terminology Cheat-Sheet (terms from A to D) to… Read more »

2018 Top 5 Cyber Security Predictions: Attacks, Regulations and Innovation

We’re about mid-way through January of 2018, which means that it’s about time I follow up on my new tradition of sharing my top cyber security predictions of the new year! Check out last year’s predictions. The Big Four: 2017 Cyber Security Predictions   This year, in many ways, shares… Read more »

Secure your Enterprise Identities in the Cloud with Microsoft 365

Microsoft 365 Identity Security

Securing Enterprise Identities in the Cloud with Microsoft 365 Microsoft 365 was recently announced as Microsoft’s new, all-encompassing suite of cloud solutions. There are different licenses available, but today I want to focus on Microsoft 365 Enterprise which integrates Office 365 Enterprise, Windows 10 Enterprise, and Enterprise Mobility + Security… Read more »

Microsoft 365: Empowering Businesses with Comprehensive Security

Microsoft 365 Security

Microsoft 365: Empowering Businesses with Comprehensive Security The news is riddled with headlines of increasingly more enterprises being compromised by data breaches. This causes business owners across the globe to be alarmed of the security of their own company’s data. In fact, a security portal that collects cybersecurity data reported that there were 1,061… Read more »

Get College Credits for your Cyber Security Training

college credits for cyber security training

Get College Credits for your Cyber Security Training According to ISACA, there will be a global shortage of two million cyber security professionals by 2019. Meanwhile, cloud security firm CloudPassage found that only one in the top 36 computer science programs in the United States requires a security course for… Read more »

Have I been Breached? 4 Signs to know when your Business is under Attack

have i been breached

Have I been Breached? 4 Signs to know when your Business is under Attack There is one major difference between how cyber security experts and everyone else think about cyber security: our expectations. While most people don’t assume there is an issue until one is presented to them, security experts… Read more »

The Cloud Security Landscape

cloud security landscape

The Cloud Security Landscape At this point, you’ve definitely heard of the cloud. Everyone, especially businesses, is talking about moving to the cloud, and their concerns about the cloud security landscape. You already use cloud-based services such as Netflix, Spotify, and Amazon. However, like with most technologies, innovation precedes security,… Read more »

Hacking History: Clifford Stoll and Operation Showerhead

Clifford Stoll

Hacking History: Clifford Stoll and Operation Showerhead- the first Honey Pot In 1986, an astronomer named Clifford Stoll, had is grant cut and started a new job in the Lawrence Berkeley Laboratory (LBL), as a systems manager. Near the beginning of his new role, his boss asked him to investigate… Read more »

Hacking History: The Morris Worm and Robert T. Morris Jr.

the Morris worm

Hacking History: Robert Tappan Morris Jr. Up to this point in our hacking history series, the figures have focused on decryption and then manual processes to intercept communications or gather information from other people’s systems. In this next installment of our series, the potential of hacking into networks and computers… Read more »