Ethical hacking: What are exploits?

Introduction The very soul of ethical hacking consists of searching for vulnerabilities and weaknesses within an organization’s system, using methods and tools that attackers would use (with... Go on to the site to read the full article ... Read More

Malware: What are rootkits?

| | General Security
Introduction Those looking to take advantage of computer users dream of being able to access computer systems of others without being detected. Couple that with elevated privileges, and you have... Go on to the site to read the full article ... Read More

Degree versus certification: Entry-level cybercrime analyst/investigator

| | General Security
Introduction Cybersecurity is a great career choice for those who have passion for information security and helping others with it. The role of cybercrime analyst takes this passion for information... Go on to the site to read the full article ... Read More

Malware: What is spyware?

| | Malware Analysis
Introduction Many things in life come with their downsides, and unfortunately, the internet is one of them. Spyware is an unavoidable (without proper measures) thorn for those traversing the web and... Go on to the site to read the full article ... Read More

Degree vs. certification: Mid-level IT Auditor

| | General Security
Introduction The middle of a career is often perceived to be a sort of “journey is the destination” kind of goal. It is expected to demand an ever-growing skill set and increased responsibility, and... Go on to the site to read the full article ... Read More

Malware: What are Trojans?

| | Malware Analysis
Introduction The term “Trojan horse” is normally associated with the ancient Greek story of “The Iliad,” so why is there a type of malware called a Trojan horse? This is done on purpose and for good... Go on to the site to read the full article ... Read More

Degree vs. certification: Entry-level IT auditor

| | General Security
Introduction Earning a degree and earning professional certifications are the two main ways to demonstrate acquired competency through education. The IT auditor career path has room for both, but... Go on to the site to read the full article ... Read More

Should you take the CCSP/SSCP before the CISSP?

| | General Security
Introduction With the number of information security certifications seemingly growing by the day, some in information security are starting to wonder whether there are any specific benefits to be had... Go on to the site to read the full article ... Read More

CySA+: Current status

| | CySA+: Current status
Introduction For the longest time, certifications focusing on high-quality, intermediate cybersecurity skills were hard to come by. Recent changes in the cyberattack landscape prompted the release of... Go on to the site to read the full article ... Read More

Degree vs. certification in the late career: Cybersecurity analyst

| | General Security
Introduction Being a late-career cybersecurity analyst puts you in an elite category of this job role. Those in the late stage of their career make up only 3.8% of all cybersecurity analysts, and... Go on to the site to read the full article ... Read More