Category Archives: Uncategorized

Securing your business with Advanced Threat Protection (ATP)

Advanced Threat Protection

Securing your business with Advanced Threat Protection (ATP) Microsoft 365’s Advanced Threat Protection protects businesses against malicious attacks, abnormal behavior, and other security risks. Learn how to leverage ATP for your, and your customers’, businesses. Enterprise-level security is becoming a top priority for every successful business. As we witness staggering… Read more »

What’s this GDPR thing about and why does it matter to me?

Microsoft 365 GDPR Compliance

What’s this GDPR thing about and why does it matter to me? Be prepared for this required, global regulatory compliance mandate by enabling Microsoft 365 compliance controls.  How companies across the globe approach data security and compliance is about to shift dramatically this upcoming May, and chances are your company… Read more »

Secure your Enterprise Identities in the Cloud with Microsoft 365

Microsoft 365 Identity Security

Securing Enterprise Identities in the Cloud with Microsoft 365 Microsoft 365 was recently announced as Microsoft’s new, all-encompassing suite of cloud solutions. There are different licenses available, but today I want to focus on Microsoft 365 Enterprise which integrates Office 365 Enterprise, Windows 10 Enterprise, and Enterprise Mobility + Security… Read more »

Get College Credits for your Cyber Security Training

college credits for cyber security training

Get College Credits for your Cyber Security Training According to ISACA, there will be a global shortage of two million cyber security professionals by 2019. Meanwhile, cloud security firm CloudPassage found that only one in the top 36 computer science programs in the United States requires a security course for… Read more »

Hacking History: Clifford Stoll and Operation Showerhead

Clifford Stoll

Hacking History: Clifford Stoll and Operation Showerhead- the first Honey Pot In 1986, an astronomer named Clifford Stoll, had is grant cut and started a new job in the Lawrence Berkeley Laboratory (LBL), as a systems manager. Near the beginning of his new role, his boss asked him to investigate… Read more »

Hacking History: The Chaos Computer Club (CCC)

Chaos Computer Club

Hacking History: The Chaos Computer Club (CCC) The Chaos Computer Club (CCC) is the oldest hacking group (I would even say, oldest hacktivist group) known in history, but also brings us all the way to 1981. Before we go into the CCC’s history, let’s do a little catch up to… Read more »

Hacking History: The Enigma Machine

Enigma Machine

Hacking History: The Enigma Machine While this series is to be (mainly) about the figures who paved the way for hackers’ futures; the enigma machine requires a post of its own due to its sordid past. Aside from the Enigma Machine being a devise used for Nazi communication during World… Read more »

#CyberHeadlines: Hack the Army

#CyberHeadlines: Hack the Army New Hack the Army program announced The U.S. Army has just announced their new “Hack the Army” program. They’ve teamed up with Hacker One and are considering this program an extension of their “Hack the Pentagon” program earlier this year. However, unlike Hack the Pentagon, Hack… Read more »

The ABC’s of Cybersecurity: P- T

The ABC’s of Cybersecurity: P-T Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber… Read more »

Cyber Headlines: Hacking Medical Devices

Cyber Headlines: Hacking Medical Devices In the ever-changing landscape of Cybersecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. As I was traveling, Dennis Skarr stepped in solo, with the… Read more »