Common causes of large breaches (Q1 2019)

Introduction: What’s to be done about data breaches? With the new focus on digital privacy and data privacy regulations, data breaches are increasingly in the news. The EU’s General Data Privacy... Go on to the site to read the full article ... Read More

AI in cybersecurity 101

| | General Security
Introduction to AI and cybersecurity Artificial intelligence (AI) is one of the perennial buzzwords of computer science. For decades, we’ve been promised robots that will take care of our every need,... Go on to the site to read the full article ... Read More

Disk Encryption 101

| | General Security
Disk Encryption 101 Encryption is one of the basic ways by which organizations and individuals can help to protect their information and that of their clients. Modern encryption algorithms make it... Go on to the site to read the full article ... Read More

Knowledge Management in Cybersecurity

| | General Security
Data has been called “the new oil.” Ensuring that the right people have access to the data that they need, and that users cannot access sensitive data without proper authorization, is an important... Go on to the site to read the full article ... Read More

Information Collection in Cybersecurity

| | General Security
The NICE framework is designed by NIST to provide a common vocabulary and definitions for various cybersecurity jobs and skill sets. Within the framework, various different jobs are defined, and the... Go on to the site to read the full article ... Read More

Data Analytics in Cybersecurity

| | General Security
The National Institute of Standards and Technology (NIST) has created the NICE framework to help standardize the terminology used to describe cybersecurity roles. The role of a cyber data analyst is... Go on to the site to read the full article ... Read More

Protecting Against Social Engineering Attacks

| | Security Awareness
Most people think of hacking as using malware and coding to bypass security defenses and steal data or money. Social engineers take a different approach, targeting the human instead of the software... Go on to the site to read the full article ... Read More

OODA and Cybersecurity

| | General Security
The OODA Loop U.S. Air Force Colonel John Boyd created the concept of the OODA loop to aid in the development of military strategy. By rapidly observing and analyzing an adversary’s behaviors, Col.... Go on to the site to read the full article ... Read More
Hiding Malware in Certificates

Hiding Malware in Certificates

| | General Security
Late last year, Sophos published a blog post describing a new tactic in the arms race between hackers trying to sneak malicious content past anti-malware and data exfiltration scanners and the... Go on to the site to read the full article ... Read More

Certified Ethical Hacker Domain 7: Ethics

| | Domain 7: Ethics
About the Domain The final domain of the current version of the Certified Ethical Hacker exam is focused on the ethics of hacking. This domain is tested by three questions on the exam, or 2.17% of... Go on to the site to read the full article ... Read More