preloader

Blog

SELECT CATEGORY
  • Careers in Cybersecurity
  • Cloud Application Security
  • Counter Adversary Operations
  • Cybersecurity Training
  • Endpoint Security & XDR
  • Engineering & Tech
  • Executive Viewpoint
  • Identity Protection
  • Incident Response
  • Next-Gen STEM & Logo Management
  • Threat Detection
  • Uncategorized
  • Vulnerability Management
Cybersecurity Isn’t Punk Rock: How to Use and Apply Compli

The year is 2005, I’m 12 years old, and one day after school, the girl who I had my first real crush on walked by with her walkman (the cd version) and after a horrifically awkward conversation, I finally asked what she was listening to. Without saying a word she put her headphones on my […]

Read More
Top Secret: A Guide to Implementing Data Classification in E

Classified Conversations When I was 12 years old, on one occasion at my best friend’s family dinner, everyone went around the table talking about their day and what they did, except for my friend’s father. Curious why he hadn’t said anything, I asked him what he did for work and how it was going. After […]

Read More
Understanding the Principle of Least Privilege

The Jurassic Park Lesson The Principle of Least Privilege is the principle that users and programs should only have the necessary privileges to complete their tasks. In the case of Jurassic Park, this whole situation could have been avoided if they had applied the principle of least privilege throughout the systems in the park. Sure, Dennis […]

Read More
5 Steps to Protect PII

A Practical Guide For Protecting Our Most Important Information It seems that week after week there is a new story in the news about yet another company suffering a data breach. It has become so commonplace now that only the truly large breaches make the headlines. But despite truly staggering numbers of data breaches, many […]

Read More
Creating and Maintaining an Audit Log Management Process

It’s 10 PM; Do You Know Where Your Logs Are? An attacker has just silently infiltrated your network. Once in the network, they were able to sneak around for several months, gathering data on the best way to carry out their attack. Finally, they find their attack path and create a new user account so […]

Read More
The Age of the Browser: How to Secure the Browser and Minimi

From Computer Labs to Chromebooks When I was in elementary school, we had one computer lab in our library that was filled with old Macintosh computers that were 1 and a half feet by 1 and a half feet cubes that weighed 50 pounds each. Each one had Microsoft Word installed on the machine with […]

Read More
How to Create and Implement a Data Recovery Plan

I was 13 years old when I learned why it was important to have good backups. It was 2008 and the new World of Warcraft expansion, Wrath of the Lich King, had just launched and the rest of my friends were already waiting in the game for me.  I was playing on the family computer so my installation took a bit longer than everyone else’s.

Read More
Understanding How Service Provider Inventories Can Help Prev

Where are Your Meat Trimmings Coming From? Hotdogs are the quintessential summertime-pool-party-grill-out food. At every BBQ in America, especially in July, you can find these cylindrical meat sticks of joy on the grill or lukewarm in a tub on the table, 4 hours after being cooked. In fact every year 20 billion hot dogs are […]

Read More
The Groove and Rhythm of Cybersecurity

Have you ever listened to a song that really grooved? How about a song that you couldn’t help but dance to? Recently I was listening to Mutemath’s self-titled album from 2006, which is an absolute banger, and found myself unconsciously bobbing my head and tapping my feet while listening to its complex yet simple grooves.

Read More