Why You Need to Master the Basics – A Three Step Campaign

When I was growing up, my father enrolled me in martial arts at an early age. I liked everything about it. I liked the friends I made, I liked the sense of achievement getting the next belt, I liked breaking boards ,but more than anything, I liked to fight. Furthermore, ... Read More

Women in Information Security: Veronica Schmitt

Last time, I got to speak with Leila Powell. She went from astrophysics to an exciting career as a security data scientist. This time, I have the pleasure of speaking with Veronica Schmitt of DFIRLABS, otherwise known as @M4lw4r3z_G1rl. She enjoys reverse engineering code, and she considers herself to be ... Read More

Ransomware-as-a-Service (RaaS): How It Works

Ransomware isn’t a new threat to the cyber world. Its origins go back many years now. Over time, this threat has become only more vicious and harmful. While people were trying to deal with this cyber threat, cybercriminals moved one step further by offering ransomware-as-a-service (RaaS). Under this service, cybercriminals ... Read More

To Ensure Cloud Security for the Future, Employee Education Must Improve Today

As new technologies like the cloud, IoT, Big Data and more emerge, organizations are playing catch up to upskill their employees to handle challenges that come with them. According to ESG’s 2018 annual global survey of the state of IT, more than half (51 percent) of respondents said their organization ... Read More

6 Best Practices to Avoid Leaks in 2018

One of the most dangerous threats to your business in 2018 is a data leak. Hackers can sell your information on the black market or simply destroy it. This could ruin your business overnight if you are not careful. So, you should use the best practices below to ensure you ... Read More

Women in Information Security: Leila Powell

Last time, I spoke with Valerie Thomas. She specializes in SCADAs and industrial control systems; she enlightened me on their cybersecurity aspects. This time, I got to speak with Leila Powell. Her background in astrophysics taught her how to manage data to better understand the effectiveness of security controls. Kim ... Read More

The Importance of Consent Forms When Carrying Out a Penetration Test

Penetration tests are an essential tool in ensuring that your computer systems are secure from known threats, and it’s important to carry them out on a regular basis or after any significant changes have been made. Forewarned is forearmed, and knowing about common pitfalls can ensure your tests run smoothly ... Read More

The Behavioral Intelligence Officer

With the advent of increased cyber security related threats, the majority of attacks point to one target, and that is the human element. Examine any survey relating to cyber security threats faced by organizations from ransomware to phishing, and these attacks all have one target in common: the human element ... Read More

All About Peerlyst, a Thriving Online Platform for Cybersecurity Professionals

I am very proud to contribute to both Tripwire’s the State of Security and to be a regular Peerlyst poster. Peerlyst is a very important online platform for cybersecurity professionals. It’s my pleasure to speak with Limor Elbaz, Peerlyst’s CEO and founder. She shared with me some excellent insight about ... Read More

8 Tips to Harden Your Joomla Installation

Joomla arrived on the scene in 2005 as a fork of the Mambo content management system (CMS). Downloaded over 91 million times, it has since eclipsed Mambo to become a ubiquitous platform for websites of all sizes. According to last year’s Hacked Website Report from Sucuri, which used insights from ... Read More