Your home wireless network is likely not very secure

Most of us don't think about hackers spying on our home internet activity and searching through our home computer files. In...

CISSP Adapative Exam – What to expect.

The vast majority of current CISSPs took their test in the old format. The test was a grueling 250 question test...

Kevin Mitnick – The Most Infamous Hacker of All Time

The art of hacking has been in development for many years. The heyday of hacking was before the Internet even existed....

What to do if your WordPress Site Gets Hacked

Some estimates state that 40% of websites use the Content Management System (CMS) known as Wordpress. Wordpress is one of the...

How to pass the CCNA Exam

If you stumbled upon this article then you are most likely familiar with what the CCNA exam is. It is a...

AWS Cloud Architect Tops the Latest Salary Survey

Amazon Web Services (AWS) is the largest player in cloud holding an astonishing 45% of the industry market share. Given this,...

IAM vs IAT Certifications

There is often some confusion about the difference between IAM and IAT certifications. Many times these terms are confused and interchanged.

The Top 20 Cities for CISSPs

We analyzed the job postings, crunched the data, and determined the actual value of the CISSP certification to list the top 20...

The Top 15 Most Used Passwords Will Make You Laugh…...

Every year the guys at SplashData analyze millions of hacked and leaked passwords from websites and online services.  They then publish this...

AI and Facial Recognition will improve society

There has been a lot of people speculating on how the combination of artificial intelligence and facial recognition will affect the future. ...

The Marriott Hack – This is What will Happen Next.

Personal information from about 500,000,000 people who made reservations at a Starwood hotel was stolen by hackers.  These...

Data Limitation Laws?

It is usually not a good idea for lawmakers to get involved in cyber security beyond a certain point.  The reason for...

How to Transition to a Cyber Security Career at Any Age

Thinking about doing a mid-career transition to a cyber security position? It is a great field to get into.  There are currently millions of unfilled...

There are 2.9 Million Open Cyber Security Jobs in the US

Companies are finding it very difficult to hire qualified Cyber Security professionals. Cyber Seek has completed a study that shows that there is a gap...

Passwords Suck and Will Go Away – Here’s How

Why Passwords Suck Usernames and Passwords are not secure by nature.  This is a control that relies on "Something you know".  Knowledge is easily transferable...

Are Dark Web Scans Effective?

The Dark Web is Anonymous The dark web is a scary place.  It is a network of websites teaming with illegal activity.  It is an...

PMP vs CISSP

How does the PMP exam compare to the CISSP exam? When someone asked me that question I thought it was rather odd.  How can you...

Don’t Underestimate the CompTia Security+ Exam

The Security+ exam isn't that easy! I was recently at a family reunion and I was talking to my cousin who does IT work for...

Your W2 Form is For Sale on the Dark Web

Tax Season is a Hacker's Dream The "dark web" is where hackers turn to sell the valuable personal data that they have stolen from their...

Why Hardware Encryption is Not Secure

A Little History In the past it was assumed that hardware encryption is far more secure than software encryption.  Many people, including security experts, still...