Category Archives: InfoSec

Women in Tech: National Cyber Security Organizations

National Cyber Security Organizations

Women in Tech: National Cyber Security Organizations After working with Women in Cyber Security (WiCyS) recently, as a sponsor of their yearly conference, I was curious about what other great organizations were making similar efforts to champion women in the information security and privacy field. As I began my search, I… Read more »

#CyberHeadlines: When your VPN is out to get you

#CyberHeadlines: When your VPN is out to get you Nicholas Deleon, writer at Motherboard, posted an article last week about a cyber fraud that targeted him recently. The story is perplexing, and comically written, and is a fun read (I recommend it). Deleon’s speculative reasoning suggests that new legislation allowing… Read more »

#CyberHeadlines: Operation Cloud Hopper- APT10 Hacks Target MSPs

hacks target msps

#CyberHeadlines: Operation Cloud Hopper- APT10 Hacks Target MSPs A new report from the National Cyber Security Centre (NCSC), in conjunction with BAE systems and PwC, details what they refer to as “one of the largest ever sustained global cyber espionage campaigns”. Using custom malware and spear phishing, Chinese hacker group… Read more »

#CyberHeadlines: Sophisticated Cyber Bank Thievery

#CyberHeadlines: Sophisticated Cyber Bank Thievery Last week, Kaspersky uncovered the first known case of “wholesale bank fraud”. Targeting 36 Brazilian banking sites last year, hackers changed the DNS (Domain Name System) registrations, controlling the bank’s website domains to direct users to phishing sites. It is believed that at the same… Read more »

Hacking History: The Mentor and The Hacker Manifesto

The Mentor and The Hacker Manifesto

Hacking History: The Mentor and The Hacker Manifesto Loyd “The Mentor” Blankenship was a second-generation Legion of Doom hacker, riding the BBS wave and hacking the telephone networks along with every other 1980’s hacker. Much like other Generation X hackers, Blankenship was very young (in high school) and didn’t respond… Read more »

How to become a Cyber Security Expert

How to become a Cyber Security Expert The cyber security job market is severely lacking in qualified applicants. Our mission is to help fill this skills-gap with quality cyber security training for recognized certifications as well as up-to-date threats and defense techniques. It is clear, however, that certifications are not… Read more »

Train-Up or Hire-In? The Pros and Cons of IT Security Training

training or hiring

Train-Up or Hire-In? The Pros and Cons of IT Security Training Whether you’ve been hit with an attack, or are just seeing all the breaches happening in the news daily, you may be concerned that your security tools are just not going to cut it anymore. Along with data security… Read more »

How to become a CISO

CISO

How to become a CISO Browse our course library and get your career path started today! What is a CISO? CISO stands for Chief Information Security Officer. The CISO is part of a company’s C-suite, or senior-level executive board. CISOs are expected to focus on the maturity level of the… Read more »

Cyber Security: Still among the Biggest Challenges for Businesses

business challenges

Cyber Security: Still among the Biggest Challenges for Businesses The cyber landscape is becoming increasingly complex and concerning for businesses. Many are at a loss as to what to do. Many large corporations, government agencies and other institutions (especially in the health care and financial sectors) have been targets of… Read more »

Hacking History: LOD vs. MOD Part 2 [The Hacker Gang War]

Legion of Doom Masters of Deception

Hacking History: LOD vs. MOD Part 2 [The Hacker Gang War] Last week, I started the story of two of the most infamous hacker gangs of the 1980’s: the Legion of Doom and the Masters of Deception. The second part of this story gets a bit more ambiguous, considering the… Read more »