Category Archives: Uncategorized

Secure your Enterprise Identities in the Cloud with Microsoft 365

Microsoft 365 Identity Security

Secure your Enterprise Identities in the Cloud with Microsoft 365 Microsoft 365 was recently announced as Microsoft’s new, all-encompassing suite of cloud solutions. There are different licenses available, but today I want to focus on Microsoft 365 Enterprise which integrates Office 365 Enterprise, Windows 10 Enterprise, and Enterprise Mobility +… Read more »

Get College Credits for your Cyber Security Training

college credits for cyber security training

Get College Credits for your Cyber Security Training According to ISACA, there will be a global shortage of two million cyber security professionals by 2019. Meanwhile, cloud security firm CloudPassage found that only one in the top 36 computer science programs in the United States requires a security course for… Read more »

Hacking History: Clifford Stoll and Operation Showerhead

Clifford Stoll

Hacking History: Clifford Stoll and Operation Showerhead- the first Honey Pot In 1986, an astronomer named Clifford Stoll, had is grant cut and started a new job in the Lawrence Berkeley Laboratory (LBL), as a systems manager. Near the beginning of his new role, his boss asked him to investigate… Read more »

Hacking History: The Chaos Computer Club (CCC)

Chaos Computer Club

Hacking History: The Chaos Computer Club (CCC) The Chaos Computer Club (CCC) is the oldest hacking group (I would even say, oldest hacktivist group) known in history, but also brings us all the way to 1981. Before we go into the CCC’s history, let’s do a little catch up to… Read more »

Hacking History: The Enigma Machine

Enigma Machine

Hacking History: The Enigma Machine While this series is to be (mainly) about the figures who paved the way for hackers’ futures; the enigma machine requires a post of its own due to its sordid past. Aside from the Enigma Machine being a devise used for Nazi communication during World… Read more »

#CyberHeadlines: Hack the Army

#CyberHeadlines: Hack the Army New Hack the Army program announced The U.S. Army has just announced their new “Hack the Army” program. They’ve teamed up with Hacker One and are considering this program an extension of their “Hack the Pentagon” program earlier this year. However, unlike Hack the Pentagon, Hack… Read more »

The ABC’s of Cybersecurity: P- T

The ABC’s of Cybersecurity: P-T Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber… Read more »

Cyber Headlines: Hacking Medical Devices

Cyber Headlines: Hacking Medical Devices In the ever-changing landscape of Cybersecurity, it’s hard to keep up sometimes. Luckily, we’re here to keep you in the loop with all the current white-hat, grey-hat and black-hat hacker news of the day. As I was traveling, Dennis Skarr stepped in solo, with the… Read more »

Cyber Threats: Brute-force Cracking

cyber threats types of cyber attacks

Cyber Threats: Brute-force Cracking Brute-force cracking basically amounts to continually guessing a password until one gets it right, allowing entry to a site. It can also mean similar trial-and-error means of finding hidden pages. The most common method of brute-force attacks are dictionary attacks. A dictionary attack utilizes a password… Read more »

5 Shocking Findings from the 2015 Global Cybersecurity Status Report

In preparation for the US State of the Union address in 2015, the Information Systems Audit and Control Association (ISACA) surveyed 3,439 ISACA members for the 2015 Global Cybersecurity Status Report (read more on the report here) to gain better understanding of the largest concerns in the cybersecurity field in… Read more »