Bookmark and Share

Hot Topics

  • Cyber Crime Trends to Watch For

Cyber Crime Trends to Watch For

December 28th, 2018|Comments Off on Cyber Crime Trends to Watch For

2017 was marked by the commonality of Healthcare breaches in line with retail breaches; increased spending on security services and automation, and IoT devices falling prey to cyberattacks. 2018 was predicted to have a rise [...]

  • eliminating the double standard in cyber

Eliminating the Double Standard

December 11th, 2018|0 Comments

Having a diverse workforce is beneficial for IT and Cyber companies. Discover how to encourage diversity and eliminate double standards here.

  • Holiday Consumer Cyber Security Tips

Holiday Consumer Cyber Security Tips

December 7th, 2018|0 Comments

There are basic precautions consumers can take during this holiday season to ensure to remain safe while operating online. Several key strategies are here!

  • How To Respond to a Data Breach

How To Respond to a Data Breach

November 20th, 2018|0 Comments

Knowing how to respond to a data breach properly helps companies minimize exposure, preserve critical evidence, and improve recovery time. Learn more here.

  • Top Cybersecurity Jobs in Demand

Top Cybersecurity Jobs in Demand

October 29th, 2018|Comments Off on Top Cybersecurity Jobs in Demand

With a projected talent gap expected to reach 2 million by 2019, industry experts and analysts are scrambling to fill key cybersecurity positions amid advances in cyberattacks. According to Stephen Zafarino, senior director of [...]

  • Top Paying Cybersecurity Certifications

Top Paying Cybersecurity Certifications

October 23rd, 2018|Comments Off on Top Paying Cybersecurity Certifications

What certification will give you the most bang for your buck and ensure quick vertical mobility up the corporate ladder? Global Knowledge’s IT Skills and Salary survey addresses that question by reviewing certifications that [...]

  • 4 Top High-paying Jobs in Cybersecurity

4 Top High-paying Jobs in Cybersecurity

October 22nd, 2018|Comments Off on 4 Top High-paying Jobs in Cybersecurity

With more than a billion identities exposed through data breaches, there’s never been a greater need for cybersecurity experts. Which means companies are looking to fill cybersecurity jobs to fill. As a new report from security [...]

  • 6 Specialized Cybersecurity Roles

6 Specialized Cybersecurity Roles

October 16th, 2018|Comments Off on 6 Specialized Cybersecurity Roles

There’s a serious skills gap in the information security industry. Cybersecurity specialists are hard to come by, causing a major talent shortage in the U.S. To give one example, technology industry data firm CyberSeek estimates that of 128,000 information [...]

6 Key Cybersecurity Influencers

October 15th, 2018|Comments Off on 6 Key Cybersecurity Influencers

Look through most lists of influential cybersecurity experts and chances are the names will belong to those working in the technical trenches: the analysts, engineers, and consultants working to beat cyberattacks around the country. Yet we should [...]

  • Jumpstarting a Career in Cybersecurity: Expert Advice

Jumpstarting a Career in Cybersecurity: Expert Advice

October 9th, 2018|Comments Off on Jumpstarting a Career in Cybersecurity: Expert Advice

To open the door to a lucrative career in cybersecurity, the consensus is you’ll need some form of a degree. Beyond that, the routes to various roles vary widely. Three cybersecurity experts in particular have forged very [...]

How to Earn a Cyber Security Certificate and Make It a Master’s Degree

October 8th, 2018|Comments Off on How to Earn a Cyber Security Certificate and Make It a Master’s Degree

Unsure of how to advance your cyber security career? Why not explore a cyber security certificate? Gain a specialization that will help you stand out from the crowd. There’s no doubt that Information Technology (IT) [...]

  • How Secure is Too Secure? Is There Such a Thing?

How Secure is Too Secure? Is There Such a Thing?

October 2nd, 2018|Comments Off on How Secure is Too Secure? Is There Such a Thing?

With such precision focus on cyber security among businesses over the past several years, it’s understandable that many are taking security to a new level. But what happens when passwords, authentication, and other methods become too cumbersome? [...]

  • Cyber Security or Information Assurance: Which Career is Right for You?

Cyber Security or Information Assurance: Which Career is Right for You?

October 1st, 2018|Comments Off on Cyber Security or Information Assurance: Which Career is Right for You?

In the discipline's early days, the majority of cyber security training was done on the job. As the field became more structured, educational institutions started offering advanced cyber security degrees. This begs the question – which one is right for [...]

  • Building a Cybersecurity Team

Building a Cybersecurity Team: What Does It Take?

September 27th, 2018|Comments Off on Building a Cybersecurity Team: What Does It Take?

With so many resources and such emphasis placed on the importance of cybersecurity departments in the public and private sphere, it’s important to know how these types of groups are structured and the skills [...]

  • public versus private sector cyber security jobs

Differences Between Public and Private Sector Cyber Security Jobs

September 12th, 2018|Comments Off on Differences Between Public and Private Sector Cyber Security Jobs

Cyber security is a growing field, given that all businesses and government agencies need to keep their data safe. Well-trained professionals will find opportunities in both the public sector and private sector, but there are distinct [...]

Cyber Crime Trends to Watch for in 2018

August 21st, 2018|Comments Off on Cyber Crime Trends to Watch for in 2018

Cyber crime isn’t likely to let up in 2018; industry experts predict it will only increase. Ransomware attacks, hacking of items in the Internet of Things (IoT)– internet-enabled devices attached to common objects, including consumer electronics (such as fitness monitors) and [...]

How to Separate and Secure Social Media

July 13th, 2018|Comments Off on How to Separate and Secure Social Media

Separate and Secure Social Media Social media is an outlet for infinite amounts of sharing, communication and public information. Attackers can use various bits of information from your public social media profiles, everything from your birth [...]

  • The Top 6 Skills You Need for a Career in Cybersecurity

The Top 6 Skills You Need for a Career in Cybersecurity

June 30th, 2018|Comments Off on The Top 6 Skills You Need for a Career in Cybersecurity

Cybersecurity professionals are in high demand across a wide range of industries. That’s why it pays to invest in building the cybersecurity skills you’ll need to set up a lucrative, long-term career. According to a 2015 report by Burning [...]

The Five Steps To Your Seat At The C-Suite

June 19th, 2018|Comments Off on The Five Steps To Your Seat At The C-Suite

Do you aspire to reach an executive level position in cyber security? Smart goal. Check out this cyber security career path to get you to the C-Suite. The average CISO earns $156,000[i] a year and [...]

CIA Hacking Isn’t Your Biggest Worry, Simple Mistakes Are

June 5th, 2018|Comments Off on CIA Hacking Isn’t Your Biggest Worry, Simple Mistakes Are

When reports surfaced recently that U.S. federal agencies have the ability to spy on ordinary users via phones, TV sets and other online devices, outrage sounded across the web. But why were so many people surprised? Global cybercrime makes [...]

Cyber Security Career Straightalk: Where to Begin

May 30th, 2018|Comments Off on Cyber Security Career Straightalk: Where to Begin

Cyber Security Career Straightalk: Where to begin Interested in a career in cyber security but don’t know where to start? It can certainly be confusing trying to make sense out of all the information and [...]

Maintaining Security As the Number of Connected Devices Grows

May 30th, 2018|Comments Off on Maintaining Security As the Number of Connected Devices Grows

The Internet of Things (IoT) has the potential to improve make life easier, but it also opens a new avenue for cyber attacks. Producers, users and cybersecurity professionals need to be proactive when it comes to security. [...]

Leading Women in Cybersecurity

May 30th, 2018|Comments Off on Leading Women in Cybersecurity

Cybersecurity, one of the fastest growing technology fields today, marked by a zero percent unemployment rate, with a significant shortfall of talented professionals, surprisingly has only 11% of the workforce represented by females globally, a statistic [...]

Top 6 Skills You Need for a Career in Cybersecurity

May 20th, 2018|Comments Off on Top 6 Skills You Need for a Career in Cybersecurity

Cybersecurity professionals are in high demand across a wide range of industries. That’s why it pays to invest in building the cybersecurity skills you’ll need to set up a lucrative, long-term career. Demand for cybersecurity professionals is up across industries [...]

  • Female IT engineer in data center

Attracting and Retaining Women in Cybersecurity: A Q&A with Jane Frankland

May 15th, 2018|Comments Off on Attracting and Retaining Women in Cybersecurity: A Q&A with Jane Frankland

Is the lack of diversity in cybersecurity actually making us less secure? Jane Frankland of Cyber Security Capital believes so. She shares her insights on how more diversity in the information security sector can mitigate risks. [...]

Can Security Measures Go Too Far?

May 11th, 2018|Comments Off on Can Security Measures Go Too Far?

With such precision focus on cyber security among businesses over the past several years, it’s understandable that many are taking security to a new level. But what happens when passwords, authentication, and other methods become too cumbersome? Can there actually [...]

  • What is cyber security? Learn more about cyber security and the processes and technologies used to protect digital networks from data breaches or threats.

Confirming Security: Project Zero

April 17th, 2018|Comments Off on Confirming Security: Project Zero

Symantec has been a leading name in the security sector for the last 15 years with wide success in enterprise security. The company is most recognizable through its consumer side, Norton anti-virus software. With so much [...]

Investing in a Career in Cyber

April 5th, 2018|Comments Off on Investing in a Career in Cyber

Many college graduates naturally worry about employment prospects upon graduation, and rightly so, given the generally soft employment figures of the last decade, particularly since the crash of ’08. If you are like the majority [...]

Why Cyber Security Professionals Want You To Know to Protect Yourself Online

March 26th, 2018|Comments Off on Why Cyber Security Professionals Want You To Know to Protect Yourself Online

Computer Security: Find Out What Cyber Security Professionals Recommend to Stay Safe Online The Cyber Security industry is in high demand for good reason. Computer security has become even more important as everyone is somehow [...]

Surveillance: How Much is Too Much?

March 21st, 2018|Comments Off on Surveillance: How Much is Too Much?

Scandal gripped the nation of Peru in 2015 when it was discovered that then vice-president and some congressmen were victims of domestic intelligence agency spying. Journalistic investigations learned how the Peruvian intelligence agency had collected [...]

  • The Snowden Phone

The Snowden Phone

March 8th, 2018|Comments Off on The Snowden Phone

Controversial NSA whistleblower, Edward Snowden, teamed up with Andrew “Bunnie” Huang, a hacker currently suing the US Department of Justice challenging provisions in the Section 1201 of the Digital Millenium Copyright Act, to create a [...]

Pay to Play: Ransomware Hacking

February 27th, 2018|Comments Off on Pay to Play: Ransomware Hacking

Europol, the EU's law enforcement, has teamed up with Russian-based Kaspersky Lab and U.S. tech giant Intel to take strong action against the proliferation of ransomware attacks. Dubbed No More Ransom this cooperation of IT security [...]

Securing the Stocks: Rule 613 & the CAT

February 20th, 2018|Comments Off on Securing the Stocks: Rule 613 & the CAT

On May 6, 2010 the U.S. Stock opened lower and began an intraday downtrend with the Dow losing some 300 points until 2:42 p.m. EST. Then it proceeded to drop precipitously another 600 points over the [...]

Information Unavailable: DDoS Hacking

February 14th, 2018|Comments Off on Information Unavailable: DDoS Hacking

One of the more commonly-used types of attack tactics implemented by hackers is the Denial of Service (DoS) hack.  At its base a denial-of-service attack is a hack that attempts to make a computer or [...]

Cyber Security Hot Topic: Cryptocurrency Security

February 7th, 2018|Comments Off on Cyber Security Hot Topic: Cryptocurrency Security

Cyber Security Hot Topic: Cryptocurrency Security It's no secret the cyber security industry has taken note of cryptocurrency security and the issues surrounding it. The currency being untraceable and transactions being irreversible leads to many [...]

Cyber Degree and Certificate Roadmap

February 5th, 2018|Comments Off on Cyber Degree and Certificate Roadmap

Cybersecurity is one of the most sought after careers in the world today. In high demand, cyber professionals are helping to ensure the safety of computer networks and systems in both the public and private [...]

Crowdsourcing Hackers for Better Security

January 23rd, 2018|Comments Off on Crowdsourcing Hackers for Better Security

Fiat Chrysler Automobiles is reaching out to the freelance community to entice white-hat hackers to aid the automaker in strengthening the cybersecurity protocols of its products and connected services by offering bounties to cybersecurity specialists [...]

Top 7 Cyber Degrees & Certificates To Further Your Career in 2018

January 12th, 2018|Comments Off on Top 7 Cyber Degrees & Certificates To Further Your Career in 2018

Tangible skills for entering the cybersecurity field are often not found in a degree program -- but the business, management, strategy and communication skills you need to complement those tactical abilities are. While it is [...]

Boosting the Role of Women in Cybersecurity Through Soft Skills

September 7th, 2017|Comments Off on Boosting the Role of Women in Cybersecurity Through Soft Skills

The tech industry’s struggle with gender diversity is well-known, but the percentage of women in tech jobs — although just 25 percent — still dwarfs that of women in cybersecurity. Here’s a jarring statistic: There [...]

Cybersecurity in an International Market

February 24th, 2017|Comments Off on Cybersecurity in an International Market

While globalization has increased information sharing, it’s also made businesses and governments more susceptible to cyber crime. Since information assurance is an international issue, nations are finding ways to collaborate to enhance security globally. Technology has connected the [...]

The Future of Cybersecurity Education and How it Will Evolve: A Q&A with Myriam Dunn Cavelty

February 22nd, 2017|Comments Off on The Future of Cybersecurity Education and How it Will Evolve: A Q&A with Myriam Dunn Cavelty

What opportunities exist in the current cybersecurity education sector? How can cybersecurity training be improved? Myriam Dunn Cavelty has the answers. cybersecurity education Cybersecurity training and education is evolving at a rapid pace, meeting the growing [...]

Your Career in Cybersecurity and How Soft Skills Can Boost Your Salary

September 7th, 2017|Comments Off on Your Career in Cybersecurity and How Soft Skills Can Boost Your Salary

Protecting classified data, foiling espionage plots and shielding computer networks from hackers might sound like the stuff of spy movies, but if you specialize in cybersecurity, these could all be in a day’s work. A [...]

Why Some Companies Are Turning to Black-hat Hackers for Cybersecurity

February 15th, 2017|Comments Off on Why Some Companies Are Turning to Black-hat Hackers for Cybersecurity

Some of today's top companies including Starbucks, Uber and Google are turning to reformed black-hat hackers to fill their cybersecurity skills shortage, with the rapidly evolving industry providing new – and legal – pathways for the next generation [...]

Q&A with Nigel Gibbons: How Businesses Can Prepare for Cyber Breaches

February 13th, 2017|Comments Off on Q&A with Nigel Gibbons: How Businesses Can Prepare for Cyber Breaches

A lot of businesses would be unable to recover from a cyber attack if it hit them. Cybersecurity consultant Nigel Gibbons discusses how organizations can improve their cyber readiness and prepare for cyber breaches and attacks. According to [...]

Cyber Security a Chief Concern in Retail

February 10th, 2017|Comments Off on Cyber Security a Chief Concern in Retail

The retail industry has taken some big hits in data security in recent years, and even with improved cyber security practices, it remains susceptible to cyber crime. Major retailers such as Target, Home Depot and Neiman Marcus [...]

Cybersecurity Recruiter Expert Reveals What You Need to Get Hired

February 8th, 2017|Comments Off on Cybersecurity Recruiter Expert Reveals What You Need to Get Hired

Recruiting Cyber Security Professionals How do cybersecurity firms pick their newest hires for the best jobs? International cybersecurity recruiter Karla Jobling reveals the insider info you’ll need to get ahead. It’s no secret that demand for [...]

  • Cybersecurity in an International Market

Cybersecurity in an International Market

November 12th, 2018|Comments Off on Cybersecurity in an International Market

While globalization has increased information sharing, it’s also made businesses and governments more susceptible to cyber crime. Since information assurance is an international issue, nations are finding ways to collaborate to enhance security globally. Technology has connected the [...]

Higher Education Learns Hard Lesson in Cyber Security

February 6th, 2017|Comments Off on Higher Education Learns Hard Lesson in Cyber Security

The higher education sector experiences some of the highest rates of cyber security incidents. Educational institutions have plenty of valuable data that makes them vulnerable to attacks. So how can they improve their cyber security [...]

Why Engineers Need Cyber Security Skills

February 3rd, 2017|Comments Off on Why Engineers Need Cyber Security Skills

While engineers have the skills to build and maintain complex systems, until now it wasn’t necessary to study cyber security as a framework of the job. That’s changing – and now, engineers need to understand [...]

Communication Among Top Soft Skills to Seek in Cybersecurity Education

September 7th, 2017|Comments Off on Communication Among Top Soft Skills to Seek in Cybersecurity Education

According to the National Association of Colleges and Employers Job Outlook 2016 survey, the five most desirable attributes employers look for when seeking new graduates are soft skills: leadership, ability to work in a team, [...]

Cybersecurity Career Guide: Key Moves for Climbing the Ladder

October 27th, 2017|Comments Off on Cybersecurity Career Guide: Key Moves for Climbing the Ladder

  Download the full guide as a PDF.  When considering going for a management position, it’s critical to understand a cybersecurity manager’s typical responsibilities. They include monitoring operations and infrastructure, ensuring regulation compliance, auditing policies and [...]

What It Takes to Be a Cybersecurity Executive

September 13th, 2017|Comments Off on What It Takes to Be a Cybersecurity Executive

For professionals looking to advance their cybersecurity career and make it to the executive level, technical skills and managerial experience alone aren’t enough to make it to the top. Cybersecurity is a business issue, not [...]

Cybersecurity Career Guide: How to Land a Senior Leadership Role

October 27th, 2017|Comments Off on Cybersecurity Career Guide: How to Land a Senior Leadership Role

  Download the full guide as a PDF. New cyber threats are constantly appearing, so people seeking senior leadership roles must stay abreast of current developments at all times. Unlike in other fields, where experienced [...]

Cybersecurity Career Guide: How to Advance Your Career at Any Stage

October 23rd, 2017|Comments Off on Cybersecurity Career Guide: How to Advance Your Career at Any Stage

    Download the full guide as a PDF. The cybersecurity field continues to grow rapidly, and the need for experts is increasing within virtually every industry. In fact, the sector cannot fill jobs fast [...]

Cybersecurity Career Guide: Advancing the Early Stage of Your Career

October 27th, 2017|Comments Off on Cybersecurity Career Guide: Advancing the Early Stage of Your Career

  Download the full guide as a PDF. Those in the early stage of their cybersecurity career should start by mapping out where they’d like their career to lead. Job seekers should consider criteria such [...]

In Cybercrime Fight, CIA Hacking Isn’t a Big Worry – Simple Mistakes Are

June 30th, 2017|Comments Off on In Cybercrime Fight, CIA Hacking Isn’t a Big Worry – Simple Mistakes Are

When reports surfaced recently that U.S. federal agencies have the ability to spy on ordinary users via phones, TV sets and other online devices, outrage over "CIA hacking" sounded across the web. But why were so many [...]

  • Jessica Gullick, vice president of the Women’s Society of Cyberjutsu

The Top Cybersecurity Education Trends You Need to Know with Jessica Gulick

May 8th, 2017|Comments Off on The Top Cybersecurity Education Trends You Need to Know with Jessica Gulick

Jessica Gulick has not only witnessed the cyber security industry's astonishing growth, she’s played an integral role in the development of the next era of its professionals. As the vice president of the Women’s Society [...]

  • Craig McDonald weighs in on the future of cybersecurity education.

The Future of Cybersecurity Education: Craig McDonald Weighs In

May 5th, 2017|Comments Off on The Future of Cybersecurity Education: Craig McDonald Weighs In

Cybersecurity education and training is becoming even more important as threats continue to multiply. Cybersecurity expert and leader Craig McDonald believes that all IT professionals should invest in cybersecurity education. Craig McDonald founded Australian cybersecurity company MailGuard in [...]

Protecting the Underdog: Cyber Crime and the Small Business

April 27th, 2017|Comments Off on Protecting the Underdog: Cyber Crime and the Small Business

Many small businesses don’t believe they have anything that cyber criminals might want to steal. Yet these companies are at as great a risk as others, if not greater. Cybersecurity professionals can help small companies [...]

Private Sector May Offer Better Cyber Security Salary, Benefits and Challenges

February 1st, 2017|Comments Off on Private Sector May Offer Better Cyber Security Salary, Benefits and Challenges

Private Sector Security Jobs Many private companies understand the value of strong cyber security, and qualified cyber security professionals are in great demand. Professionals looking for a higher cyber security salary, and other benefits, may [...]

Best Paying Cybersecurity Jobs and Where to Find Them

April 24th, 2017|Comments Off on Best Paying Cybersecurity Jobs and Where to Find Them

What salary could you get from your next, or first, cybersecurity job? The salary expectations and opportunities are different in various locations for the best paying cybersecurity jobs in this rapidly expanding sector. Cyber crime is on the rise, [...]

Cybersecurity and Its Role in Protecting Industrial Control Systems: A Q&A with Patrick Miller

January 30th, 2017|Comments Off on Cybersecurity and Its Role in Protecting Industrial Control Systems: A Q&A with Patrick Miller

Cybersecurity is a concern for all sectors, and the industrial control systems (ICS) industry is the latest to see an uptick in attacks. Whether it’s manufacturing, energy, oil or chemical plants, protecting the systems that run these operations is critical [...]

Information Security Is Key for Autonomous Cybersecurity Defense

April 20th, 2017|Comments Off on Information Security Is Key for Autonomous Cybersecurity Defense

The Need for Better Information Security The emerging future of military cyber information security technology involves machines that can self-direct, self-protect and self-evolve but what are the risks and benefits? More importantly, could these weapons [...]

The Best Schools for Cyber Security Degrees

January 27th, 2017|Comments Off on The Best Schools for Cyber Security Degrees

Finding the Best Cyber Security Degree Program Considering expanding your IT qualifications with a cyber security degree? Discover some of the courses offered by the best cyber security schools in the country – and what [...]

Digital Warfare: Are State-Sponsored Cyber Attacks the Wave of the Future?

April 18th, 2017|Comments Off on Digital Warfare: Are State-Sponsored Cyber Attacks the Wave of the Future?

Countries have to do more than protect their borders these days; they have to protect their databases. State-sponsored cyber attacks are on the rise, and improving cybersecurity isn’t just about privacy — it’s about national security. It’s no secret [...]

How the Banking Industry is Fighting Cyber Crime

January 25th, 2017|Comments Off on How the Banking Industry is Fighting Cyber Crime

How Cyber Crime Affects the Banking Industry Cyber criminals are going directly to where the money is – the financial sector. Banks and financial firms are big targets for cyber crime, so the industry is stepping [...]

  • Information Security Is Key for Autonomous Cybersecurity Defense

Information Security Is Key for Autonomous Cybersecurity Defense

November 5th, 2018|Comments Off on Information Security Is Key for Autonomous Cybersecurity Defense

The emerging future of military cybersecurity technology involves machines that can self-direct, self-protect and self-evolve but what are the risks and benefits? More importantly, could these weapons be turned against us? As automation advances, IT and [...]

How to Become a Highly Paid Ethical Hacker

January 23rd, 2017|Comments Off on How to Become a Highly Paid Ethical Hacker

Ethical hackers are in increasing demand as companies scramble to protect themselves from mounting cybersecurity threats. What's involved in this well-paid role and how do you become a white-hat hacker? Ethical – or white-hat – hackers could [...]

The Big Five Cybersecurity Risks Facing Smart Cities

April 14th, 2017|Comments Off on The Big Five Cybersecurity Risks Facing Smart Cities

Today’s smart cities may be underprepared for a range of cybersecurity risks, and must address key vulnerabilities before hackers exploit them. As cities rapidly deploy connected devices and big data to create “smart” networks, from [...]

Crisis Management: 7 Steps to Contain a Cyber Attack

January 20th, 2017|Comments Off on Crisis Management: 7 Steps to Contain a Cyber Attack

How Large Corporations Can Contain a Cyber Attack Swift, decisive action is the key to containing a cyber attack. Find out how to limit the damage it can cause with this seven-step plan. With cyber crime [...]

From the U.S. to Europe and Asia: Cybersecurity Policies Around the Globe

January 18th, 2017|Comments Off on From the U.S. to Europe and Asia: Cybersecurity Policies Around the Globe

Whether it’s a data breach, theft or a cyber attack, nations are facing constant threats to their networks. As a result, governments worldwide are implementing cybersecurity policies to combat rising cyber crime. Cybersecurity threats are a growing concern around [...]

Cybersecurity Career Advancement: How to Rise Through the Ranks in Cybersecurity

March 1st, 2017|Comments Off on Cybersecurity Career Advancement: How to Rise Through the Ranks in Cybersecurity

Many people studying information security want to know about cybersecurity career advancement. Find out how you can rise through the cybersecurity ranks and where a degree in the field could take you. Advancing through a cybersecurity career can seem like a [...]

Cyber Security and Its Role in Government. How Government Can Combat Cyber Threats

January 17th, 2017|Comments Off on Cyber Security and Its Role in Government. How Government Can Combat Cyber Threats

Cyber Security is Vitally Important for Government Organizations Discover how government data can be exposed and learn what’s being done to combat cyber threats. Government organizations are under constant threat from cyber crime. Unfortunately, they have so [...]

Web Encryption 2.0: A Q&A with Security Expert Scott Helme

February 27th, 2017|Comments Off on Web Encryption 2.0: A Q&A with Security Expert Scott Helme

Is web encryption just for sites with sensitive data? Security expert Scott Helme explains why every site needs this layer of cybersecurity, and how the industry is quickly adopting it. According to recent reports, about half of all web traffic is [...]

Censorship Around the World: When Does Global Cybersecurity Cross the Line?

January 13th, 2017|Comments Off on Censorship Around the World: When Does Global Cybersecurity Cross the Line?

Cybersecurity is necessary to protect governments around the globe from cyber threats, but what happens if cybersecurity oversteps its bounds and threatens freedom and privacy? Governments and other organizations around the world are bolstering their cybersecurity efforts, not [...]

Top Cybersecurity Interview Questions: What You Need to Know

February 21st, 2017|Comments Off on Top Cybersecurity Interview Questions: What You Need to Know

So you’ve successfully completed your cybersecurity degree and want to use your newfound skills to get a well-paid cybersecurity job? First, you’ll need to answer the notoriously tough cybersecurity interview questions that could stand between [...]

Everything You Need to Know About Trump’s Cybersecurity Strategy

January 13th, 2017|Comments Off on Everything You Need to Know About Trump’s Cybersecurity Strategy

As cyber crime continues to rise, Donald Trump faces a serious challenge in getting this problem under control. Experts have their own ideas about what constitutes an appropriate response, but Trump’s plans to address the issue are yet [...]

Q&A with Troy Hunt: Why Big Businesses Fail at Cybersecurity

February 17th, 2017|Comments Off on Q&A with Troy Hunt: Why Big Businesses Fail at Cybersecurity

Data breaches are becoming more frequent and costly to organizations, and poor cybersecurity and unqualified professionals are often the culprits. So what can companies do to fix the problem? It seems like every week there’s news of [...]

Former White House CIO Discusses Government Cyber Security

January 11th, 2017|Comments Off on Former White House CIO Discusses Government Cyber Security

Recent data breaches in government agencies have raised concerns about cyber security. Former White House chief information officer (CIO) Theresa Payton discusses the new challenges facing the government and the best way to deal with threats. If [...]

Addressing the Talent Shortage in Cyber Security with Jack Daniel

January 9th, 2017|Comments Off on Addressing the Talent Shortage in Cyber Security with Jack Daniel

Is there Talent Shortage in Cybersecurity? According to a Cybersecurity Ventures report, there are one million job openings in cyber security and that number could grow to six million globally by 2019. Cyber security expert Jack [...]

Gain Critical Cyber Security Management Skills With an Advanced Cyber Security Degree

January 6th, 2017|Comments Off on Gain Critical Cyber Security Management Skills With an Advanced Cyber Security Degree

The role of a cyber security manager requires a complex set of skills above and beyond those required for entry- and mid-level cyber security professionals. A Bachelor’s degree and a few years of experience can [...]

Cyber Security and its Role in Law Enforcement and Homeland Security: A Q&A with Todd Rosenblum

January 4th, 2017|Comments Off on Cyber Security and its Role in Law Enforcement and Homeland Security: A Q&A with Todd Rosenblum

Cyber security plays an essential role in law enforcement and Homeland Security. Todd Rosenblum is at the forefront of federal security and intelligence, and shares his thoughts on information assurance in law enforcement. For more [...]

3 Easy Ways to Protect Yourself from Cyber Crime on Cyber Monday

January 4th, 2017|Comments Off on 3 Easy Ways to Protect Yourself from Cyber Crime on Cyber Monday

Cyber Monday is a happy hunting ground for hackers. Protect yourself from cyber crime next shopping season with these three simple steps. Cyber Monday is big business. In 2015, total digital sales that day topped $3 billion, going [...]

  • Cyber security Hillary vs. Trump

Hillary vs. Donald: Cyber Security and the President-Elect

November 2nd, 2016|Comments Off on Hillary vs. Donald: Cyber Security and the President-Elect

    Cyber security has been at the forefront of the U.S. presidential campaign. Not only has Hillary Clinton been in the hot seat for using an unsecured private email server during her time as Secretary [...]

  • information security challenges in politics

Information Security Challenges and Presidential Politics

November 2nd, 2016|Comments Off on Information Security Challenges and Presidential Politics

In recent years information security challenges have dominated headlines as hacking incidents at companies – such as Home Depot, Target and Anthem – become more prevalent. But 2016 seems to be the year of the political hack. [...]

  • Cyber security digital forensics professional

The Next CSI: Digital Forensics in Cyber Security

November 2nd, 2016|Comments Off on The Next CSI: Digital Forensics in Cyber Security

"Digital forensics" is a broad term referring to the search for and detection, recovery and preservation of evidence found on digital systems, often for criminal or civil legal purposes. Digital forensics can sometimes involve the [...]

  • Stop Cyber Crime with a Cyber Master's Degree

Combating Cyber Crime: Why You Need a Master’s Degree

October 31st, 2016|Comments Off on Combating Cyber Crime: Why You Need a Master’s Degree

The number of attacks against private businesses and governments is now reaching fever pitch, with the total cost of cyber crime set to reach $2 trillion by 2019. In the past, hackers have been able [...]

  • Hacker using cyber security threats

Top Cyber Security Threats That Hackers Love

October 28th, 2016|Comments Off on Top Cyber Security Threats That Hackers Love

Cyber security threats are becoming all to common and with each passing day, malicious hackers become smarter and more agile in their tactics. You don’t have to look far these days to find cyber security [...]

  • Cyber security trick on halloween

A Cyber Security Trick: Don’t Fall Victim This Halloween

October 27th, 2016|Comments Off on A Cyber Security Trick: Don’t Fall Victim This Halloween

Halloween may be the one night in the year when ghouls, ghosts and goblins routinely roam the streets, but in the brave new online world a litany of cyber security threats  are constantly lurking just [...]

  • There is a huge opportunity for women in the cyber security field. Learn more about this in-demand career path.

The 5 Leading Women Shaping the Cyber Security Sector

October 26th, 2016|Comments Off on The 5 Leading Women Shaping the Cyber Security Sector

Cyber security is a high-demand field. There may be as many as a million job openings in cyber security worldwide. Postings are up 74 percent over the past five years. This also means there is a huge opportunity [...]

  • Everyday Cyber Security Threats

The Watch List: Everyday Cyber Security Threats

November 19th, 2018|0 Comments

You don’t have to look far these days to find cyber security news of hackers, cyber criminals and other hostile agents successfully compromising computer networks and systems for their own benefit. Here's a look at [...]

  • Women in Cybersecurity: Are There Enough and Could There Be More?

Are There Enough Women in Cybersecurity?

October 24th, 2016|0 Comments

The first computer programmer was a woman –­ Ada Lovelace. Ida Rhodes designed the first computers to run the U.S. Census and Social Security systems. Margaret Hamilton wrote software that got Apollo 11 on the [...]

  • Learn more about Cloud Cyber Security. Find out what to do.

What You Need to Know: Risks of Cloud Services

October 21st, 2016|Comments Off on What You Need to Know: Risks of Cloud Services

Cyber crime costs the average U.S. company $15.4 million each year. Despite this, many companies are still lagging when it comes to protecting their data and cloud applications from cyber security threats including cloud cyber [...]

  • How to Become Certified Chief Information Security Officer Infographic. This infographic lays it all out for you with career pathing.

[Infographic] How to Become a Chief Information Security Officer

October 19th, 2016|Comments Off on [Infographic] How to Become a Chief Information Security Officer

Want to Be a Certified Chief Information Security Officer? Here's How As an industry experiencing double-digit growth, cyber security is becoming an increasingly important issue in all organizations. Below you'll find an infographic that covers [...]

  • Demand for Entry Level Cyber Security Jobs and Senior Cyber Security Executives

Employers Have Higher (Degree) Demands for Cybersecurity Jobs

October 18th, 2016|Comments Off on Employers Have Higher (Degree) Demands for Cybersecurity Jobs

In July 2016, Intel Security and the U.S. Center for Strategic and International Studies (CSIS) released Hacking the Skills Shortage, a report outlining the talent shortage across the cybersecurity industry worldwide.  Find out what the [...]

  • Healthcare Cyber Security. Understanding Healthcare Cyber Security.

Why Healthcare Needs Cyber Security Professionals

October 18th, 2016|Comments Off on Why Healthcare Needs Cyber Security Professionals

Much of the focus in cyber security has been on individuals’ data accessed through retailers or government databases, but the healthcare sector is facing more pressing security needs than ever before for healthcare cyber security. Understanding the [...]

  • Women in cyber security, Deidre Diamond

Why Deidre Diamond Wants More Women in Cyber Security

October 18th, 2016|0 Comments

When it comes to the leading women in cyber security, Deidre Diamond rises to the top. As Founder and CEO of CyberSN and #brainbabe, Deidre Diamond is influencing the culture of cyber security for women and men alike. With more [...]

  • A chief information security officer (CISO) looking at a tablet

Is the CISO the Most Important C-Suite Role?

October 18th, 2016|Comments Off on Is the CISO the Most Important C-Suite Role?

As cyber security is becomes an increasingly important issue in all industries, so does the role of the chief information security officer (CISO). In 2015, 79 percent of businesses detected a security incident, and there has [...]

Tesla Motors Not Immune to Devious Hackers

October 18th, 2016|0 Comments

Tesla Motors, known for wrapping their innovative long range battery technology in an attractive future-car shell, has recently become the victim/beneficiary of some white-hat hackers who displayed their research at the Def Con hacker conference [...]

A New Kind of Crime: The Cyber Criminal

August 18th, 2016|0 Comments

The Cyber Criminal Think of the name Al Capone. You may associate him with a tommy gun or remember an anecdote someone told you about his life in Chicago. Point made – you know the [...]

The Spacebelt Information Ultra-Highway

August 17th, 2016|0 Comments

Contributed by Jeffrey Sebranek Technological innovation in the modern world is beginning to move at breakneck speed. Unending reams of data are being generated by technologies ranging widely from CRM, social media, medical and financial [...]

LinkNYC Brought to you Free by CITYBRIDGE

August 16th, 2016|0 Comments

Contributed by Jeffrey Sebranek So, what is the purpose of LinkNYC? The city of New York is among the premier cities in the world, yet there are still millions of New York City residents who [...]

Hacking as a Service in The Underground Economy

August 12th, 2016|0 Comments

Contributed by Jeffrey Sebranek Gathering data is the gold rush of the 21st century, with Google/Alphabet Corp and Amazon leading the way in competing to create the largest database in history. These massive subscriber databases [...]

  • Women in Cybersecurity are Needed

Women in Cybersecurity

August 11th, 2016|0 Comments

From high-profile data breeches at big companies like Sony Pictures, Apple, and Target, to the thousands of small businesses that have reported cyber attacks, the vulnerability of the growing amount of digital data has become [...]

DNC Gets Hacked

July 22nd, 2016|0 Comments

Contributed by Jeffrey Sebranek The 2016 DNC Hacking Two nebulous Russian hacking organizations have recently infiltrated the network of the Democratic National Committee, making off with emails, chats and a cache of opposition research on [...]

Career Advancing with Cyber Certifications

July 6th, 2016|0 Comments

Contributed by Jack Roth Today, people from all walks of life use the Internet to communicate, work and play on a global landscape. This dynamic technology has changed society and has become the underlying fabric [...]

Business Email Compromise (BEC)

June 23rd, 2016|0 Comments

In this age of rapidly expanding technology, where the hacker persists one step ahead of the cybersecurity curve, business email compromise (BEC) remains a low-tech but highly lucrative card in the cyber criminal deck. According [...]