Category Archives: Uncategorized

The Need-to-Know Terms of the General Data Protection Regulation

GDPR Terminology

We’ve compiled our recent series of terms pertaining to the General Data Protection Regulation (GDPR). GDPR goes into effect May 25th, and many organizations are still struggling to meet the compliance standards outlined in it. We’ll soon be posting blogs about GDPR for different industries, and roles as well as… Read more »

Need-to-Know GDPR Terminology for Compliance Success- Part 1

GDPR Terminology

GDPR from A-Z The GDPR is just a few months away, which means the countdown-crunch to compliance has begun. If you’re just beginning to learn about the General Data Protection Regulation, being implemented by the European Union in May, use this GDPR Terminology Cheat-Sheet (terms from A to D) to… Read more »

How to Protect your Data for GDPR Compliance

GDPR Compliance

How to Protect your Data for GDPR Compliance The goal for GDPR compliance is to protect your company’s sensitive data from exposure to threats.  Not to mention, if your company is not taking steps to protect the data of your employees and customers, you will be fined for non-compliance. We… Read more »

Securing your business with Advanced Threat Protection (ATP)

Advanced Threat Protection

Securing your business with Advanced Threat Protection (ATP) Microsoft 365’s Advanced Threat Protection protects businesses against malicious attacks, abnormal behavior, and other security risks. Learn how to leverage ATP for your, and your customers’, businesses. Enterprise-level security is becoming a top priority for every successful business. As we witness staggering… Read more »

What’s this GDPR thing about and why does it matter to me?

Microsoft 365 GDPR Compliance

What’s this GDPR thing about and why does it matter to me? Be prepared for this required, global regulatory compliance mandate by enabling Microsoft 365 compliance controls.  How companies across the globe approach data security and compliance is about to shift dramatically this upcoming May, and chances are your company… Read more »

Secure your Enterprise Identities in the Cloud with Microsoft 365

Microsoft 365 Identity Security

Securing Enterprise Identities in the Cloud with Microsoft 365 Microsoft 365 was recently announced as Microsoft’s new, all-encompassing suite of cloud solutions. There are different licenses available, but today I want to focus on Microsoft 365 Enterprise which integrates Office 365 Enterprise, Windows 10 Enterprise, and Enterprise Mobility + Security… Read more »

Get College Credits for your Cyber Security Training

college credits for cyber security training

Get College Credits for your Cyber Security Training According to ISACA, there will be a global shortage of two million cyber security professionals by 2019. Meanwhile, cloud security firm CloudPassage found that only one in the top 36 computer science programs in the United States requires a security course for… Read more »

Hacking History: Clifford Stoll and Operation Showerhead

Clifford Stoll

Hacking History: Clifford Stoll and Operation Showerhead- the first Honey Pot In 1986, an astronomer named Clifford Stoll, had is grant cut and started a new job in the Lawrence Berkeley Laboratory (LBL), as a systems manager. Near the beginning of his new role, his boss asked him to investigate… Read more »

Hacking History: The Chaos Computer Club (CCC)

Chaos Computer Club

Hacking History: The Chaos Computer Club (CCC) The Chaos Computer Club (CCC) is the oldest hacking group (I would even say, oldest hacktivist group) known in history, but also brings us all the way to 1981. Before we go into the CCC’s history, let’s do a little catch up to… Read more »

Hacking History: The Enigma Machine

Enigma Machine

Hacking History: The Enigma Machine While this series is to be (mainly) about the figures who paved the way for hackers’ futures; the enigma machine requires a post of its own due to its sordid past. Aside from the Enigma Machine being a devise used for Nazi communication during World… Read more »