preloader

Blog

SELECT CATEGORY
  • Careers in Cybersecurity
  • Cloud Application Security
  • Counter Adversary Operations
  • Cybersecurity Training
  • Endpoint Security & XDR
  • Engineering & Tech
  • Executive Viewpoint
  • Identity Protection
  • Incident Response
  • Next-Gen STEM & Logo Management
  • Threat Detection
  • Uncategorized
  • Vulnerability Management
Harnessing AI and Machine Learning for Enhanced Malware Defe

Malware: Understanding the Threat Now, flash forward 20 some years and the word malware gets thrown around so much these days that it is used to describe so many different computer ailments and has become almost a unanimous term for any computer or internet-related issue that someone might experience. On top of this generalization, cybersecurity […]

Read More
How to Create and Implement a Data Recovery Plan

I was 13 years old when I learned why it was important to have good backups. It was 2008 and the new World of Warcraft expansion, Wrath of the Lich King, had just launched and the rest of my friends were already waiting in the game for me.  I was playing on the family computer so my installation took a bit longer than everyone else’s.

Read More
Brick By Brick 

Security Awareness Training is one of the best ways to increase your district’s security posture. A study done in 2021 performed by IBM showed that human error was a major contributor to 95% of all breaches.

Read More
Understanding How Service Provider Inventories Can Help Prev

Where are Your Meat Trimmings Coming From? Hotdogs are the quintessential summertime-pool-party-grill-out food. At every BBQ in America, especially in July, you can find these cylindrical meat sticks of joy on the grill or lukewarm in a tub on the table, 4 hours after being cooked. In fact every year 20 billion hot dogs are […]

Read More
2023: The Year of Cybersecurity

In this article, we will be covering one of the most essential projects your district technology team should be working on this year, updating and maintaining your district’s hardware and software inventories.

Read More
The Groove and Rhythm of Cybersecurity

Have you ever listened to a song that really grooved? How about a song that you couldn’t help but dance to? Recently I was listening to Mutemath’s self-titled album from 2006, which is an absolute banger, and found myself unconsciously bobbing my head and tapping my feet while listening to its complex yet simple grooves.

Read More
Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!

Read More