IAM vs IAT Certifications
There is often some confusion about the difference between IAM and IAT certifications. Many times these terms are confused and interchanged. Both IAM and IAT
There is often some confusion about the difference between IAM and IAT certifications. Many times these terms are confused and interchanged. Both IAM and IAT
There has been a lot of speculation on how the combination of artificial intelligence and facial recognition will affect the future. This speculation focuses on
Personal information from about 500,000,000 people who made reservations at a Starwood hotel was stolen by hackers. These hotels include Sheraton, Aloft, W Hotels, and
It is usually not a good idea for lawmakers to get involved in cybersecurity beyond a certain point. The reason for this is that lawmakers
Are you thinking about doing a mid-career transition to a cybersecurity position? It is a great field to join. There are currently millions of unfilled
Why Passwords Suck Usernames and Passwords are not secure by nature. Usernames and Passwords are controls that rely on “Something you know.” Knowledge is easily
The Dark Web is Anonymous The dark web is a scary place. It is a network of websites teeming with illegal activity. It is a
How does the PMP exam compare to the CISSP exam? When someone asked me that question, I thought it was rather odd. How can you
The Comptia Security+ exam isn’t that easy! I was recently at a family reunion, and I was talking to my cousin, who does IT work
Hardware Encryption is not Secure A Little History… In the past, it was assumed that hardware encryption is far more secure than software encryption. Many
When Hackers Kill Hackers have already – perhaps many times- have contributed to death by hacking into secure systems and releasing information. This information has
Zerodium is a reputable place where you can sell zero-day exploits. Hackers and security researchers know that Zerodium is a way to cash in on
Persian Stalker is targeting Iranian social media accounts. The “group” has been around since 2017, and they have been observed targeting social media accounts. Specifically,
Reading is not my best learning style. In today’s world of podcasts and audiobooks, I believe that fewer and fewer people are accustomed to learning
According to “The Retail and eCommerce Threat Landscape Report” from October 2018, there is a 297% increase in the number of phishing websites that target
A new research report Published by cybersecurity specialists, BestVPN.com, shows the state of online privacy in the United States. BestVPN surveyed 1,000 U.S. consumers to
Experts think that the infamous North Korean hacker group Lazarus accounts for targeted strikes against five cryptocurrency exchanges. North Korea’s burgeoning cyber military seems to
FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in many IoT hardware products has newly identified vulnerabilities. The vulnerabilities
Another successful ransomware attack…. The City of West Haven, Connecticut made the tough decision to pay hackers $2,000 in ransom money after a ransomware attack
According to research by Kaspersky Lab, 86% of Cybersecurity professionals think that hackers are not stoppable and will eventually succeed at compromising the systems that
Malware is short for “Malicious Software” and has been around for a very long time. Way back in the 1980s, trojans and other types of
A cryptocurrency mining code called Coinhive is creeping onto unsuspecting websites around the net. Coinhive uses javascript to harness computer users CPU capacity when they
Everyone is talking about the Bloomberg Businessweek’s volatile report alleging that Chinese spies had implanted surveillance chips in the motherboards of computer servers. The report