The False Claims Act and cybersecurity: Are third-party vendors putting you at risk?

| | General Security
Introduction A government supplier law written over a century ago may seem outdated in the digital age, but it may be putting your company at risk. Recent court rulings related to the 1863 False... Go on to the site to read the full article ... Read More

Ethical Hacking: How to hack a web server

When practicing ethical hacking, a hacker is searching for vulnerabilities. An ethical hacker has several reasons to try gaining unauthorized control of a web server, though the primary reason is to... Go on to the site to read the full article ... Read More

CISSP Domain 1: Security and Risk Management- What you need to know for the Exam

Risk is a crucial element in all our lives. In every action we plan to take in our personal and professional lives, we need to analyze the risks associated with it. From a cyber security perspective,... Go on to the site to read the full article ... Read More

Due Care vs. Due Diligence and the CISSP

Due Care vs. Due Diligence and the CISSP Due care and due diligence are two terms that are not interchangeable, but are equally important to be mindful of. For instance, anyone wanting to take... Go on to the site to read the full article ... Read More
About Infosec

About Infosec

| | Other
At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certifications and... Go on to the site to read the full article ... Read More