Importance of Cybersecurity in Military

The basic role of the military is to provide security to every citizen and it cannot protect the citizens if it cannot protect itself....

IoT in the Smart Home: Challenges and Solution

Only 5 years before, there was a breeze of IoT everywhere and people talking about vision 2020 where 20 billion IoT devices will...

Guarding Ourselves from Cybersecurity Threats

We cannot live without technology, it has changed the way we live and do things. We will agree with me that life without technology...

Securing Network Printers

IoT is among many buzz words of today and is one of the technologies guiding our future lifestyle. According to data and...

Tips to Increase your Cybersecurity

Often, many people think that cybercrime is just about hackers out there who want to steal their financial information. This is not the case;...

What is the best IT certification to have?

A picture is worth a thousand words. There are a ton of IT certifications but the monster of all...

Why hackers love patching

When a company issues a patch to fix security issues the bad guys start salivating.  They know that in many cases they now have...

Every day we hear about new security breaches. Why don’t...

There are high profile Cyber Security breaches almost Daily Cybersecurity breaches seem to be a Continuous part of modern life, With a new high-profile leak...

Your W2 Form is For Sale on the Dark Web

Tax Season is a Hacker's Dream The "dark web" is where hackers turn to sell the valuable personal data that they have stolen from their...

The Future of Cyber Security

The rate at which cybercrime is rising is alarming. Almost every week, a high profile cybercrime is reported. Every business is in its own...

5 Interesting Cyber Crime Stories

Living in this Internet Era, cyber crime has become a reality. Most of us might have not been a victim of this...

Countering Cybersecurity Attacks

It is a cry of every person, organization and even countries that a long lasting solution for cybersecurity is found.  Every day,...

The Top 15 Most Used Passwords Will Make You Laugh…...

Every year the guys at SplashData analyze millions of hacked and leaked passwords from websites and online services.  They then publish this...

CASP vs. CISSP – My Experience

I decided to take the CASP exam for only one reason... There is really only one reason that I originally took the CASP exam instead...

GDPR Summary: 5 steps to get GDPR compliant

Internet came into being in the early 80s and continued to evolve in decades. It provided a novel way of relaying information from its...

AI Weaponization

Artificial intelligence technologies are currently being leveraged to execute intelligent cyberattacks. In fact, AI tech already developed in open source is posed to be combined...

Cybersecurity Certifications You Need to Do

In the current world, technology has taken over; companies in the world have embraced the use of technology to safe resources.  Many companies are...

The Top 20 Cities for CISSPs

We analyzed the job postings, crunched the data, and determined the actual value of the CISSP certification to list the top 20...

Increasing demand for accredited cyber security professionals

It has been reported by Information Systems Security Association (ISSA) that cyber security professionals believe organization are facing cybersecurity skills shortage and that workload  for...

There are 2.9 Million Open Cyber Security Jobs in the US

Companies are finding it very difficult to hire qualified Cyber Security professionals. Cyber Seek has completed a study that shows that there is a gap...