Category Archives: Training

5 Steps to Increase Your Company’s Cyber Security Awareness

Increase your company's cyber security awareness

5 Steps to Increase Your Company’s Cyber Security Awareness Just over a month ago, I published a blog with 5 Steps to Increase Your Cyber Security Awareness. This is the follow up so that you can have great personal cyber security, preventative practices and safe-guard your entire company as well…. Read more »

How to become a Forensic Computer Analyst

how to become a forensic computer analyst

How to become a Forensic Computer Analyst Browse our course library and get your career path started today! What is a Forensic Computer Analyst? A Forensic Computer Analyst (or Forensic Computer Investigator) works with law enforcement and private entities to identify systems and networks which have been compromised from criminal… Read more »

#CyberHeadlines: Businesses Invest in Filling the Skills-Gap

#CyberHeadlines

Businesses Invest in Filling the Skills-Gap HealthDataManagement.com compared multiple reports which have been recently published about organizations combatting the growing skills-gap with spending increases in their data security endeavors. Looking at reports by Thales, Crowd Research Partners, the Center for Cyber Safety and Education as well as the 2017 Cybersecurity… Read more »

Hacking History: The 414s

the 414s

Hacking History: The 414s The 80’s Hacker Craze In the early 1980’s the internet and home-computer were relatively new and had yet to be accounted for, in the United States legal system. Innovation and progress moved faster than the bureaucratic system could keep up with, let alone predict. In 1983… Read more »

#CyberHeadlines: Cloudflare’s CloudBleed

#CyberHeadlines

CloudBleed, the Cloudflare Vulnerability In late February, Tavis Ormandy, Google security researcher, contacted Cloudflare, the web performance and security company, about a memory leak happening in their system due to a parser bug. Many companies, such as Salesforce, Uber and OK Cupid, use Cloudflare who touts Performance, Security Reliability and… Read more »

#CyberHeadlines: 1st Practical SHA-1 Collision Attack

#CyberHeadlines

The 1st Practical SHA-1 Collision Attack Researchers from Google, the Cryptology Group at Centrum Wiskunde and Informatica in Amsterdam, published a paper last week about the first practical collision attack for the cryptographic hash function SHA-1. The attack method entails the collision of two PDF files by obtaining the SHA-1 signature… Read more »

#CyberHeadlines: AWS Outage, Dridex Update, Boeing Faux-Pas

#CyberHeadlines

AWS Outage, Dridex Update, Boeing Faux-Pas A lot of big cyber security news happened at the end of February, here are some of the biggest stories, we thought you need to know about. Amazon Web Services Outage February 28th, Amazon’s oldest AWS server had an outage, taking many sites down… Read more »

How to become a Network Security Administrator

how to become a network security administration

How to Become a Network Security Administrator Browse our course library and get your career path started today! What is a Network Security Administrator? The Network Security Administrator (or Systems Administrator) is a jack-of-all-trades in the security sector. Ultimately, it’s the Network Security Administrator’s job to keep an organization’s network… Read more »

Hacking History: The Chaos Computer Club (CCC)

Chaos Computer Club

Hacking History: The Chaos Computer Club (CCC) The Chaos Computer Club (CCC) is the oldest hacking group (I would even say, oldest hacktivist group) known in history, but also brings us all the way to 1981. Before we go into the CCC’s history, let’s do a little catch up to… Read more »

The Essentials: The ABC’s of Cyber Security

essential cyber security

Essential Cyber Security Terminology Now that cyber security is increasingly in the spotlight, and top-of mind for individuals and businesses, it’s important to know essential cyber security terms to help you navigate the conversations. We have compiled our ABC’s of Cyber Security to provide you this short glossary of terms,… Read more »