preloader

Blog

SELECT CATEGORY
  • Careers in Cybersecurity
  • Cloud Application Security
  • Counter Adversary Operations
  • Cybersecurity Training
  • Endpoint Security & XDR
  • Engineering & Tech
  • Executive Viewpoint
  • Identity Protection
  • Incident Response
  • Next-Gen STEM & Logo Management
  • Threat Detection
  • Uncategorized
  • Vulnerability Management
A Day in the Life… Cybersecurity Edition

Beyond the Hollywood Hacker A hooded figure sits at a small desk in complete darkness with just the light of the computer screen dimly illuminating the outline of their face as they furiously pound away at their keyboard. Suddenly they stop typing and in an ominous voice exclaim “I’m in!” For most people when they […]

Read More
Cybersecurity Isn’t Punk Rock: How to Use and Apply Compli

The year is 2005, I’m 12 years old, and one day after school, the girl who I had my first real crush on walked by with her walkman (the cd version) and after a horrifically awkward conversation, I finally asked what she was listening to. Without saying a word she put her headphones on my […]

Read More
How Hardware and Software Inventories Help Secure Our Networ

Cybersecurity is like a Gas Station? Every morning I wake up and get ready for the day in the same usual way, walk and feed the dogs, take a shower and get dressed, and then head to work. By the time I get to work though I have to be ready to hit the ground […]

Read More
Malware Analysis of the Emotet Banking Trojan

Current Day Heist Ever since I can remember, my Dad has always loved watching heist movies. Whether it was Ocean’s 11, Catch Me If You Can, National Treasure, or the Italian Job, if there is a heist movie on TV, he’s watching it, and more than likely changing the channels during the commercials if there […]

Read More
Creating and Maintaining an Audit Log Management Process

It’s 10 PM; Do You Know Where Your Logs Are? An attacker has just silently infiltrated your network. Once in the network, they were able to sneak around for several months, gathering data on the best way to carry out their attack. Finally, they find their attack path and create a new user account so […]

Read More
How to Create and Implement a Data Recovery Plan

I was 13 years old when I learned why it was important to have good backups. It was 2008 and the new World of Warcraft expansion, Wrath of the Lich King, had just launched and the rest of my friends were already waiting in the game for me.  I was playing on the family computer so my installation took a bit longer than everyone else’s.

Read More
2023: The Year of Cybersecurity

In this article, we will be covering one of the most essential projects your district technology team should be working on this year, updating and maintaining your district’s hardware and software inventories.

Read More