Cybersecurity

How to pass the CCNA Exam

If you stumbled upon this article, then you are most likely familiar with what the CCNA exam is. It is a vendor-specific exam that covers the basics of networking. CCNA stands for Cisco Certified Network Associate. There are now multiple flavors of CCNA exams, including CCNA Security, CCNA Cloud, CCNA Data Center, and many others. …

How to pass the CCNA Exam Read More »

AWS Cloud Architect Tops the Latest Salary Survey

Amazon Web Services (AWS) is the most significant player in the cloud, holding an astonishing 45% of the industry market share. Given this, there is a huge demand for experts in AWS cloud experts. The latest Salary Survey from CertMag.com proves that AWS professionals can make substantial salaries. The AWS Certified Solutions Architect certification is …

AWS Cloud Architect Tops the Latest Salary Survey Read More »

IAM vs IAT Certifications

There is often some confusion about the difference between IAM and IAT certifications. Many times these terms are confused and interchanged. Both IAM and IAT were established by the Dept. of Defense in 2004. These are qualification standards meant to ensure that the Dept. of Defense IT systems are staffed with technical and management personnel …

IAM vs IAT Certifications Read More »

AI and Facial Recognition will improve society

There has been a lot of speculation on how the combination of artificial intelligence and facial recognition will affect the future.  This speculation focuses on how this technology will be intrusive of our privacy rights. It sounds scary It sounds a bit scary when you first think about it.  Anytime you are at an event, …

AI and Facial Recognition will improve society Read More »

The Marriott Hack – This is What will Happen Next.

Personal information from about 500,000,000 people who made reservations at a Starwood hotel was stolen by hackers.  These hotels include Sheraton, Aloft, W Hotels, and Westin Hotels.  Marriott acquired the Starwood Group back in 2016, but the compromise started way back in 2014 before the acquisition took place. Hackers had full access for four years …

The Marriott Hack – This is What will Happen Next. Read More »

Cybersecurity Career Transition

How to Transition to a Cyber Security Career at Any Age

Are you thinking about doing a mid-career transition to a cybersecurity position? It is a great field to join.  There are currently millions of unfilled cybersecurity jobs in the US and countless more around the world.  There are not enough qualified applicants to fill these jobs. Because qualified applicants are limited, the salaries for cybersecurity …

How to Transition to a Cyber Security Career at Any Age Read More »

Passwords Suck and Will Go Away – Here’s How

Why Passwords Suck Usernames and Passwords are not secure by nature.  Usernames and Passwords are controls that rely on “Something you know.”  Knowledge is easily transferable, and therefore, passwords are not secure. No amount of security training will eliminate or overcome human nature.  It is human nature to make passwords we can easily remember.  Passwords …

Passwords Suck and Will Go Away – Here’s How Read More »

Are Dark Web Scans Effective?

The Dark Web is Anonymous The dark web is a scary place.  It is a network of websites teeming with illegal activity.  It is a secret place where visitors protect their identity by using techniques to keep identifying information (Like their IP address) hidden. There are several methods that people use to keep themselves anonymous …

Are Dark Web Scans Effective? Read More »

Hardware Encryption

Why Hardware Encryption is Not Secure

Hardware Encryption is not Secure A Little History… In the past, it was assumed that hardware encryption is far more secure than software encryption.  Many people, including security experts, still believe this to be true.  And in the past, it was true. But recent history has proven that hardware encryption is highly vulnerable.  The widely …

Why Hardware Encryption is Not Secure Read More »

Murder By Hacking

Murder by Hacking

When Hackers Kill Hackers have already – perhaps many times- have contributed to death by hacking into secure systems and releasing information.  This information has lead to the loss of life in many different ways, including suicide and murder. But hacking has now evolved to the point that cybercriminals can use computers to negatively affect …

Murder by Hacking Read More »

What is Persian Stalker?

Persian Stalker is targeting Iranian social media accounts. The “group” has been around since 2017, and they have been observed targeting social media accounts.  Specifically, this group focuses on gaining access and control of Instagram and Telegram accounts. Telegram is a popular service with about 40 million users.  Telegram is a communication app that has …

What is Persian Stalker? Read More »

More data shows that Americans are lackadaisical about security.

A new research report Published by cybersecurity specialists, BestVPN.com, shows the state of online privacy in the United States. BestVPN surveyed 1,000 U.S. consumers to comprehend the state of online privacy in 2018. The report reveals a significant knowledge gap and suggests that, despite their fears, US citizens are not protecting themselves against the ever-growing …

More data shows that Americans are lackadaisical about security. Read More »

North Korean Cryptocurrency Scam Efforts – Marine Chain

Experts think that the infamous North Korean hacker group Lazarus accounts for targeted strikes against five cryptocurrency exchanges. North Korea’s burgeoning cyber military seems to have especially honed its assault abilities to attack cryptocurrency-related organizations. In the face of mounting and crippling international sanctions, Pyongyang’s many hacker groups have adopted cryptocurrency-focused malicious attempts as an …

North Korean Cryptocurrency Scam Efforts – Marine Chain Read More »

The Bloomberg article about Supermicro Supply Chain Hardware Hack

Everyone is talking about the Bloomberg Businessweek’s volatile report alleging that Chinese spies had implanted surveillance chips in the motherboards of computer servers. The report is not standing up to the smell test.  As president Trump would say – This is fake news. Apple, Amazon, and the other involved parties delivered strong denials.  If these …

The Bloomberg article about Supermicro Supply Chain Hardware Hack Read More »