Common causes of large breaches (Q1 2019)
Introduction: What’s to be done about data breaches? With the new focus on digital privacy and data privacy regulations, data breaches are increasingly in the news. The EU’s General Data Privacy... Go on to the site to read the full article ... Read More
AI in cybersecurity 101
Introduction to AI and cybersecurity Artificial intelligence (AI) is one of the perennial buzzwords of computer science. For decades, we’ve been promised robots that will take care of our every need,... Go on to the site to read the full article ... Read More
Disk Encryption 101
Disk Encryption 101 Encryption is one of the basic ways by which organizations and individuals can help to protect their information and that of their clients. Modern encryption algorithms make it... Go on to the site to read the full article ... Read More
Knowledge Management in Cybersecurity
Data has been called “the new oil.” Ensuring that the right people have access to the data that they need, and that users cannot access sensitive data without proper authorization, is an important... Go on to the site to read the full article ... Read More
Information Collection in Cybersecurity
The NICE framework is designed by NIST to provide a common vocabulary and definitions for various cybersecurity jobs and skill sets. Within the framework, various different jobs are defined, and the... Go on to the site to read the full article ... Read More
Data Analytics in Cybersecurity
The National Institute of Standards and Technology (NIST) has created the NICE framework to help standardize the terminology used to describe cybersecurity roles. The role of a cyber data analyst is... Go on to the site to read the full article ... Read More
Protecting Against Social Engineering Attacks
Most people think of hacking as using malware and coding to bypass security defenses and steal data or money. Social engineers take a different approach, targeting the human instead of the software... Go on to the site to read the full article ... Read More
OODA and Cybersecurity
The OODA Loop U.S. Air Force Colonel John Boyd created the concept of the OODA loop to aid in the development of military strategy. By rapidly observing and analyzing an adversary’s behaviors, Col.... Go on to the site to read the full article ... Read More
Hiding Malware in Certificates
Late last year, Sophos published a blog post describing a new tactic in the arms race between hackers trying to sneak malicious content past anti-malware and data exfiltration scanners and the... Go on to the site to read the full article ... Read More
Certified Ethical Hacker Domain 7: Ethics
About the Domain The final domain of the current version of the Certified Ethical Hacker exam is focused on the ethics of hacking. This domain is tested by three questions on the exam, or 2.17% of... Go on to the site to read the full article ... Read More