preloader

Blog

SELECT CATEGORY
  • Careers in Cybersecurity
  • Cloud Application Security
  • Counter Adversary Operations
  • Cybersecurity Training
  • Endpoint Security & XDR
  • Engineering & Tech
  • Executive Viewpoint
  • Identity Protection
  • Incident Response
  • Next-Gen STEM & Logo Management
  • Threat Detection
  • Uncategorized
  • Vulnerability Management
Identifying and Reporting Cybersecurity Incidents

CSI: Cybersecurity Investigators Knowing how to identify a potential cyber-attack has seemingly become a job requirement nowadays for anyone working with technology in any k-12 school district. But with so many devices, services, and solutions that make up our technology environment, monitoring every asset 24/7 has become an impractical if not impossible task. However, knowing […]

Read More
How Hardware and Software Inventories Help Secure Our Networ

Cybersecurity is like a Gas Station? Every morning I wake up and get ready for the day in the same usual way, walk and feed the dogs, take a shower and get dressed, and then head to work. By the time I get to work though I have to be ready to hit the ground […]

Read More
Top Secret: A Guide to Implementing Data Classification in E

Classified Conversations When I was 12 years old, on one occasion at my best friend’s family dinner, everyone went around the table talking about their day and what they did, except for my friend’s father. Curious why he hadn’t said anything, I asked him what he did for work and how it was going. After […]

Read More
The Age of the Browser: How to Secure the Browser and Minimi

From Computer Labs to Chromebooks When I was in elementary school, we had one computer lab in our library that was filled with old Macintosh computers that were 1 and a half feet by 1 and a half feet cubes that weighed 50 pounds each. Each one had Microsoft Word installed on the machine with […]

Read More
Understanding How Service Provider Inventories Can Help Prev

Where are Your Meat Trimmings Coming From? Hotdogs are the quintessential summertime-pool-party-grill-out food. At every BBQ in America, especially in July, you can find these cylindrical meat sticks of joy on the grill or lukewarm in a tub on the table, 4 hours after being cooked. In fact every year 20 billion hot dogs are […]

Read More
The Groove and Rhythm of Cybersecurity

Have you ever listened to a song that really grooved? How about a song that you couldn’t help but dance to? Recently I was listening to Mutemath’s self-titled album from 2006, which is an absolute banger, and found myself unconsciously bobbing my head and tapping my feet while listening to its complex yet simple grooves.

Read More