John King, CISSP, PMP, CISM

John King currently works in the greater Los Angeles area as a ISSO (Information Systems Security Officer). John has a passion for learning and developing his cyber security skills through education, hands on work, and studying for IT certifications.
No Featured Image

Cybersecurity Triumphs and Innovations Unveiled at Convene Cleveland 2025

Cybersecurity Triumphs and Innovations Unveiled at Convene Cleveland 2025 Summary Revolutionary Technologies: Advancement in AI-driven security systems took center stage.…

No Featured Image

AI Pioneer Harsh Doshi Revolutionizes Enterprise Security Amid Rising Threats

AI Pioneer Harsh Doshi Revolutionizes Enterprise Security Amid Rising Threats Summary Harsh Doshi’s innovative AI solutions combat global cybersecurity threats…

No Featured Image

AI-Generated Code Sparks Alarming Concerns Among Cybersecurity Experts

AI-Generated Code Sparks Alarming Concerns Among Cybersecurity Experts Summary Growing Use: AI-generated code is increasingly prevalent across software development industries,...

No Featured Image

Maryland Pioneers Trailblazing Cybersecurity Initiative for State and Local Safety

Maryland Pioneers Trailblazing Cybersecurity Initiative for State and Local Safety Summary Innovative Cybersecurity Program: Maryland unveils a forward-thinking cybersecurity ...

No Featured Image

Bridging Generations: Dallas Event Sparks Digital Safety Dialogue

Summary Bridging the Generational Gap: An event in Dallas fosters dialogue on cybersecurity across generations. Intergenerational Learning: Seniors and youth…

No Featured Image

Conduent Data Breach: A Cyber Intrigue Unfolding Since 2024

Conduent Data Breach: A Cyber Intrigue Unfolding Since 2024 Summary: A significant data breach at Conduent, a business process services…

No Featured Image

OPSWAT Launches Hungary Cyber Lab to Fortify Global Infrastructure Security

Summary OPSWAT Launches Cyber Lab: OPSWAT inaugurates a new cyber lab in Hungary, focusing on critical infrastructure security. Strategic Location:…

No Featured Image

Cyber Defense Becomes Essential Asset in Corporate Growth Strategy

Cyber Defense Becomes Essential Asset in Corporate Growth Strategy Summary Strategic Shift: Companies are integrating cybersecurity into their core growth…

No Featured Image

Rep. Swalwell Demands CISA Accountability Amid Surprising Workforce Reductions

Rep. Swalwell Demands CISA Accountability Amid Surprising Workforce Reductions Summary Congressman Eric Swalwell addresses concerns over cybersecurity workforce cuts. CISAR...

No Featured Image

SentinelOne’s New SMB Alliance: A Game-Changer for Cybersecurity Strategy?

SentinelOne’s New SMB Alliance: A Game-Changer for Cybersecurity Strategy? Summary SentinelOne unveils a strategic partnership to fortify cybersecurity measures for…

No Featured Image

Shutdown Shockwaves: Cybersecurity Experts Brace for Impact

Shutdown Shockwaves: Cybersecurity Experts Brace for Impact Summary Government Shutdown Risks: Funding gaps during government shutdowns threaten federal cybersecurity operatio...

Gardens in the Digital Age: NEC Secures Cyber Future for Horticultural Expo

Gardens in the Digital Age: NEC Secures Cyber Future for Horticultural Expo

Gardens in the Digital Age: NEC Secures Cyber Future for Horticultural Expo Summary: NEC Corporation collaborates with Expo 2025, Osaka,…

Oklahoma’s Cybersecurity Initiative Paves Path to a Secure Digital Era

Oklahoma’s Cybersecurity Initiative Paves Path to a Secure Digital Era

Oklahoma’s Cybersecurity Initiative Paves Path to a Secure Digital Era Summary: Statewide Cybersecurity Programs: Oklahoma’s proactive approach to combatting cyber...