Category Archives: Training

The Cloud Security Landscape

cloud security landscape

The Cloud Security Landscape At this point, you’ve definitely heard of the cloud. Everyone, especially businesses, is talking about moving to the cloud, and their concerns about the cloud security landscape. You already use cloud-based services such as Netflix, Spotify, and Amazon. However, like with most technologies, innovation precedes security,… Read more »

Who’s responsible for the Cyber Security of your Company?

responsible for cyber security

Who’s responsible for the Cyber Security of your Company? Many companies hold IT solely responsible for online information privacy and security, but experts agree that this is not a sustainable security business model. In an interview with the Wall Street Journal, Former CIA and NSA Director, Gen. Michael Hayden, calls… Read more »

Why Train Employees in Cyber Security?

train employees in cyber security

Why Train Employees in Cyber Security? Cyber security is often an afterthought for businesses, and this can be detrimental. Many companies don’t provide cyber security awareness training to employees, nor their IT teams in the technical aspects. Those that do, rarely follow up that training going forward. Cyber security is… Read more »

YouTube Cyber Security Questions Answered: “Should I take CEH or OSCP first? What about CISSP?”

YouTube Cyber Security Questions

YouTube Cyber Security Questions Answered: “Should I take CEH or OSCP first? What about CISSP?” Our YouTube viewers are often actively working towards cyber security expertise and have great questions for us! Upon answering a question last week, I decided it may be nice to go into depth with some… Read more »

Have I been Breached? 4 Signs to know when your Business is under Attack

have i been breached

Have I been Breached? 4 Signs to know when your Business is under Attack There is one major difference between how cyber security experts and everyone else think about cyber security: our expectations. While most people don’t assume there is an issue until one is presented to them, security experts… Read more »

WannaCry Ransomware Roundup

WannaCry ransomware

WannaCry Ransomware Roundup On May 12, 2017, a new ransomware strain, deemed “WannaCry” (WannaCrypt), was found by Malwarebytes (an anti-malware software company). Programmed to run in 27 languages, the ransomware’s first major infection, which grabbed all our attention, was when it hit the National Health Service of Britain (NHS). British… Read more »

Am I being hacked? 4 ways to tell if your system’s been compromised

am I being hacked

  Am I being hacked? 4 ways to tell if your system’s been compromised How do you tell if your computer or accounts have been hacked? Below are four, easy ways to tell if your system and/or accounts have been compromised. If you suspect your system or accounts are under… Read more »

Women in Tech: National Cyber Security Organizations

National Cyber Security Organizations

Women in Tech: National Cyber Security Organizations After working with Women in Cyber Security (WiCyS) recently, as a sponsor of their yearly conference, I was curious about what other great organizations were making similar efforts to champion women in the information security and privacy field. As I began my search, I… Read more »

How to become a Cyber Security Expert

How to become a Cyber Security Expert The cyber security job market is severely lacking in qualified applicants. Our mission is to help fill this skills-gap with quality cyber security training for recognized certifications as well as up-to-date threats and defense techniques. It is clear, however, that certifications are not… Read more »

Train-Up or Hire-In? The Pros and Cons of IT Security Training

training or hiring

Train-Up or Hire-In? The Pros and Cons of IT Security Training Whether you’ve been hit with an attack, or are just seeing all the breaches happening in the news daily, you may be concerned that your security tools are just not going to cut it anymore. Along with data security… Read more »