Why you failed the CISSP exam and how to make sure you pass on the next try!

Why you failed the CISSP exam and how to make sure you pass on the next try!

If you work in the cybersecurity field, then you know that there are only four types of people: People who passed the CISSP exam People who are studying for the CISSP exam People who failed the CISSP exam People who are too fearful of taking the exam Having the CISSP certification is a must if … Read more

The Marriott  Hack - This is What will Happen Next.

The Marriott Hack – This is What will Happen Next.

Personal information from about 500,000,000 people who made reservations at a Starwood hotel was stolen by hackers.  These hotels include Sheraton, Aloft, W Hotels, and Westin Hotels.  Marriott acquired the Starwood Group back in 2016, but the compromise started way back in 2014 before the acquisition took place. Hackers had full access for four years … Read more

How to Transition to a Cyber Security Career at Any Age

How to Transition to a Cyber Security Career at Any Age

Are you thinking about doing a mid-career transition to a cybersecurity position? It is a great field to join.  There are currently millions of unfilled cybersecurity jobs in the US and countless more around the world.  There are not enough qualified applicants to fill these jobs. Because qualified applicants are limited, the salaries for cybersecurity … Read more

Passwords Suck and Will Go Away - Here's How

Passwords Suck and Will Go Away – Here’s How

Why Passwords Suck Usernames and Passwords are not secure by nature.  Usernames and Passwords are controls that rely on “Something you know.”  Knowledge is easily transferable, and therefore, passwords are not secure. No amount of security training will eliminate or overcome human nature.  It is human nature to make passwords we can easily remember.  Passwords … Read more

Why Hardware Encryption is Not Secure

Why Hardware Encryption is Not Secure

A Little History In the past, it was assumed that hardware encryption is far more secure than software encryption.  Many people, including security experts, still believe this to be true.  And in the past it was true. But recent history has proven that hardware encryption is highly vulnerable.  The widely published recent discovered hardware encryption … Read more

Murder by Hacking

Murder by Hacking

When Hackers Kill Hackers have already – perhaps many times- have contributed to death by hacking into secure systems and releasing information.  This information has lead to loss of life in many different ways, including suicide and murder. But hacking has now evolved to the point that cybercriminals can use computers to negatively affect and … Read more