Hot Topics
Hackers Turned Deadly
Click here to learn about two hackers found themselves on the wrong end of a deadly tale.
Keeping Children Safe in a Digital World
How do we keep our children safe in a digital world? Click here for some quick key elements of online and digital safety, such as a family policy!
Famous Hackers and Their Groups: Cosmo and UGNazi
UGNazi wreaked havoc across the US from 2012-1014. From government officials and to the Wounded Warrior Project. Click here for several key elements.
Famous Hackers and Their Groups: Adrian Lamo and Project Vigilante
Most hackers fall into one of two groups. Computer enthusiasts who pursue noble causes or cybercriminals. Adrian Lamo doesn't fit into either, see why here
Cybersecurity Best Practices: New Cellphone Security
Experts agree that these simple steps and strategies for new cellphones users will put themselves in the safest position. See what you need to know here.
Famous Hackers and their Groups Judain and the Cyber Caliphate
Judain and the Cyber Caliphate Hackers' story ends in death. Several key elements of this story will be discussed. Click to read this Hollywood movie plot.
Famous Hackers and Their Groups: Judain ‘Trick’ Hussain and Team Poison
Team Poison and its leader, Judain 'Trick' Hussain, drew international attention with their hacks. The fact that they were mostly teens didn't limit them.
Pen Testing – Cybersecurity Education Spotlight
Pen testing is a vital part of the Cybersecurity profession. Learn more about the necessity, types, and key education factors related to pen testing.
Career Spotlight: Information Assurance Analyst
What does a day in the life of an information assurance analyst look like? How much do they make? What are the job duties? Find out this and more, here.
Top 5 Entry-Level Cyber Roles: Getting Your Foot in the Door
There are many opportunities for workers to start and advance their careers within cybersecurity, but how do you get started? Click here to learn how.
Famous Hackers and Their Groups Series: Syrian Electronic Army
Discover key information about the Syrian Electronic Army, their connections, attacks, and members as the Famous Hackers and Their Groups Series continues.
Job Builder Launches to Aid Hiring Managers
Looking for tool to help you find a new job in Cybersecurity, but no luck? Check out this article about CyberNS's new Job Builder to hiring managers.
Top 3 In Demand Cyber Jobs
Cyber professionals are in high demand. Read on to learn about the Top 3 In-demand cyber jobs!
Career Spotlight: Cybersecurity Architect
Working as a cybersecurity architect can be an exciting and fulfilling career. Read on to learn all about how to get into this career field.
Famous Hackers and Their Groups: Masters of Deception
Some hacker groups have noble intentions. Masters of Deception(MOD) doesn't fall into that category. Learn about this group of teenage boys of hackers.
Career Spotlight: Cybersecurity Engineer
You need security engineers to protect computer systems. Click here for a career spotlight on the cyber security engineer.
Career Spotlight: Cybersecurity Manager
Depending on the industry and the size of the team, a cybersecurity manager's role varies. Read this spotlight on the role of a cyber security manager.
How Vulnerable Are Your Mobile Devices?
The rise of cyber crime over the past decade has made organizations of all types nervous, but there’s another area that shouldn’t be left untouched –mobile security.Defending against attacks on smartphones and other mobile devices is an important [...]
Malware: Cybersecurity Education Spotlight
Malware isn't going to relinquish its crown as the preferred tool of cybercriminals anytime soon. Click here to see what you need to know.
CyberSN Connects Cyber Professionals with Top Companies
CyberSN has assembled a network of the most talented Cybersecurity/IT professionals to support your needs and fight challenges. See what you need to know.
Cybersecurity Consultant – Career Spotlight
Cybersecurity is growing at a rapid pace as losses increase due to cyber attacks. Learn firsthand the role of a cybersecurity consultant.
Penetration & Vulnerability Tester – Career Spotlight
An ethical hacker examines security weaknesses as it relates to computer infrastructures. Click for a spotlight on a vulnerability & penetration tester.
Career Spotlight: Cybersecurity Specialist / Technician
Information security specialists and technicians have extremely important roles in cyber security. Learn more about the roles and career outlook, here.
Hackers and Their Groups: Anonymous
Anonymous is one Hacker group requiring very little introduction. They are one of the most famous underground groups in the world. Click here to see why.
Career Spotlight: IT Auditor
IT auditing is a budding field for anyone with a real interest in IT and computer networking. What does an auditor do? Find out in this career spotlight.
Famous Hackers and Their Groups: Oxblood Ruffin and Cult of the Dead Cow
The word hacker often conjures a negative image, but this isn't always the case. Read about Oxblood Ruffin and Cult of the Dead Cow, famous hackers.
Career Spotlight: Cybersecurity Analyst
Cybersecurity is a looming concern for most businesses. Learn the role of a cybersecurity analyst and their importance in the IT infrastructure.
Cybersecurity Frontier Series: Customer Data
There are tons of technology to help combat the cybersecurity risks involved with gathering customer data. Click here to see what you need to know.
Famous Hackers and their Groups Series: Mudge and L0ft
Most hackers stay in the shadows, however sometimes become well-known. Click here to learn about Mudge and L0ft respected 90's hackers!
Career Spotlight: Cyber Crime Fraud Analyst / Investigator
Considering a career in Cyber Security? Check out our Career Spotlight for Cyber Crime Fraud Analyst/Investigator! See what you need to know here!
Career Spotlight: Incident Responder
A cyber incident responder addresses security threats and breaches. Click here for the career spotlight on cyber security incident analysts.
2019’s Best Online Cyber Programs For Advancing Cyber Professionals
Online degrees specialize in the advancement of cyber professionals. Click here to find out 2019's best online cyber security degree.
Cyber Crime Trends to Watch For
2017 was marked by the commonality of Healthcare breaches in line with retail breaches; increased spending on security services and automation, and IoT devices falling prey to cyberattacks. 2018 was predicted to have a rise [...]
8 Benefits for Earning Your Master’s in Cybersecurity 2019
If you've been thinking about going back to school for your Master's degree, here are some major benefits of a Master's degree in 2019 in Cybersecurity.
Cyber Security Program Curriculum Spotlight – Data Hiding
This article covers emerging data hiding techniques used in still images, video streams, audio files, and DNA sequences.
Career Spotlight: Financial & Risk Analysis
If you're wondering what it takes to have a career of financial risk analysis, then this article is for you. We're discussing what the field looks like.
Career Spotlight: Systems Engineering & Systems Administration
If you're wondering what the job outlook for Systems Engineering and Systems Administration are then you're in the right place. Click here to learn more.
Career Spotlight: Security Intelligence
Security intelligence work is no walk in the park. It's a tough field that requires tough, hard-working employees. It may be for you. Click to learn more!
Famous Hackers and Their Members – Julius Kivimaki and the Lizard Squad
Famous Hackers and Their Members: Julius Kivimaki and the Lizard Squad Hacker groups sometimes become infamous for their actions. See what actions here.
Hackers and Their Groups: Sabu and LulzSec
Sabu and LulzSec Hackers and their groups are not usually far from the headlines in modern society. See what you need to know here.
Eliminating the Double Standard
Having a diverse workforce is beneficial for IT and Cyber companies. Discover how to encourage diversity and eliminate double standards here.
Holiday Consumer Cyber Security Tips
There are basic precautions consumers can take during this holiday season to ensure to remain safe while operating online. Several key strategies are here!
Famous Hackers and Their Groups – Albert Gonzalez and his ‘Get Rich or Die Trying’ Crew
Famous Hackers and Their Groups: Albert Gonzalez and his 'Get Rich or Die Trying' Crew Hackers keep the cybersecurity world on edge. Read why here.
Gifts that Give Cybersecurity
This holiday season, why not give gifts that promote Cybersecurity for those who matter most? See what you need to know here.
Cyber Security Alert – Cryptojacking
There is a new threat in the cyber security realm, cryptojacking. It is important for cybersecurity pros to understand this new threat and how to stop it.
How To Respond to a Data Breach
Knowing how to respond to a data breach properly helps companies minimize exposure, preserve critical evidence, and improve recovery time. Learn more here.
Top Cybersecurity Jobs in Demand
With a projected talent gap expected to reach 2 million by 2019, industry experts and analysts are scrambling to fill key cybersecurity positions amid advances in cyberattacks. According to Stephen Zafarino, senior director of [...]
Top Paying Cybersecurity Certifications
What certification will give you the most bang for your buck and ensure quick vertical mobility up the corporate ladder? Global Knowledge’s IT Skills and Salary survey addresses that question by reviewing certifications that [...]
4 Top High-paying Jobs in Cybersecurity
With more than a billion identities exposed through data breaches, there’s never been a greater need for cybersecurity experts. Which means companies are looking to fill cybersecurity jobs to fill. As a new report from security [...]
6 Specialized Cybersecurity Roles
There’s a serious skills gap in the information security industry. Cybersecurity specialists are hard to come by, causing a major talent shortage in the U.S. To give one example, technology industry data firm CyberSeek estimates that of 128,000 information [...]
6 Key Cybersecurity Influencers
Look through most lists of influential cybersecurity experts and chances are the names will belong to those working in the technical trenches: the analysts, engineers, and consultants working to beat cyberattacks around the country. Yet we should [...]
Jumpstarting a Career in Cybersecurity: Expert Advice
To open the door to a lucrative career in cybersecurity, the consensus is you’ll need some form of a degree. Beyond that, the routes to various roles vary widely. Three cybersecurity experts in particular have forged very [...]
How to Earn a Cyber Security Certificate and Make It a Master’s Degree
Unsure of how to advance your cyber security career? Why not explore a cyber security certificate? Gain a specialization that will help you stand out from the crowd. There’s no doubt that Information Technology (IT) [...]
How Secure is Too Secure? Is There Such a Thing?
With such precision focus on cyber security among businesses over the past several years, it’s understandable that many are taking security to a new level. But what happens when passwords, authentication, and other methods become too cumbersome? [...]
Cyber Security or Information Assurance: Which Career is Right for You?
In the discipline's early days, the majority of cyber security training was done on the job. As the field became more structured, educational institutions started offering advanced cyber security degrees. This begs the question – which one is right for [...]
Building a Cybersecurity Team: What Does It Take?
With so many resources and such emphasis placed on the importance of cybersecurity departments in the public and private sphere, it’s important to know how these types of groups are structured and the skills [...]
Differences Between Public and Private Sector Cyber Security Jobs
Cyber security is a growing field, given that all businesses and government agencies need to keep their data safe. Well-trained professionals will find opportunities in both the public sector and private sector, but there are distinct [...]
Cyber Crime Trends to Watch for in 2018
Cyber crime isn’t likely to let up in 2018; industry experts predict it will only increase. Ransomware attacks, hacking of items in the Internet of Things (IoT)– internet-enabled devices attached to common objects, including consumer electronics (such as fitness monitors) and [...]
How to Separate and Secure Social Media
Separate and Secure Social Media Social media is an outlet for infinite amounts of sharing, communication and public information. Attackers can use various bits of information from your public social media profiles, everything from your birth [...]
The Top 6 Skills You Need for a Career in Cybersecurity
Cybersecurity professionals are in high demand across a wide range of industries. That’s why it pays to invest in building the cybersecurity skills you’ll need to set up a lucrative, long-term career. According to a 2015 report by Burning [...]
The Five Steps To Your Seat At The C-Suite
Do you aspire to reach an executive level position in cyber security? Smart goal. Check out this cyber security career path to get you to the C-Suite. The average CISO earns $156,000[i] a year and [...]
CIA Hacking Isn’t Your Biggest Worry, Simple Mistakes Are
When reports surfaced recently that U.S. federal agencies have the ability to spy on ordinary users via phones, TV sets and other online devices, outrage sounded across the web. But why were so many people surprised? Global cybercrime makes [...]
Cyber Security Career Straightalk: Where to Begin
Cyber Security Career Straightalk: Where to begin Interested in a career in cyber security but don’t know where to start? It can certainly be confusing trying to make sense out of all the information and [...]
Maintaining Security As the Number of Connected Devices Grows
The Internet of Things (IoT) has the potential to improve make life easier, but it also opens a new avenue for cyber attacks. Producers, users and cybersecurity professionals need to be proactive when it comes to security. [...]
Leading Women in Cybersecurity
Cybersecurity, one of the fastest growing technology fields today, marked by a zero percent unemployment rate, with a significant shortfall of talented professionals, surprisingly has only 11% of the workforce represented by females globally, a statistic [...]
Top 6 Skills You Need for a Career in Cybersecurity
Cybersecurity professionals are in high demand across a wide range of industries. That’s why it pays to invest in building the cybersecurity skills you’ll need to set up a lucrative, long-term career. Demand for cybersecurity professionals is up across industries [...]
Attracting and Retaining Women in Cybersecurity: A Q&A with Jane Frankland
Is the lack of diversity in cybersecurity actually making us less secure? Jane Frankland of Cyber Security Capital believes so. She shares her insights on how more diversity in the information security sector can mitigate risks. [...]
Can Security Measures Go Too Far?
With such precision focus on cyber security among businesses over the past several years, it’s understandable that many are taking security to a new level. But what happens when passwords, authentication, and other methods become too cumbersome? Can there actually [...]
Confirming Security: Project Zero
Symantec has been a leading name in the security sector for the last 15 years with wide success in enterprise security. The company is most recognizable through its consumer side, Norton anti-virus software. With so much [...]
Investing in a Career in Cyber
Many college graduates naturally worry about employment prospects upon graduation, and rightly so, given the generally soft employment figures of the last decade, particularly since the crash of ’08. If you are like the majority [...]
Why Cyber Security Professionals Want You To Know to Protect Yourself Online
Computer Security: Find Out What Cyber Security Professionals Recommend to Stay Safe Online The Cyber Security industry is in high demand for good reason. Computer security has become even more important as everyone is somehow [...]
Surveillance: How Much is Too Much?
Scandal gripped the nation of Peru in 2015 when it was discovered that then vice-president and some congressmen were victims of domestic intelligence agency spying. Journalistic investigations learned how the Peruvian intelligence agency had collected [...]
The Snowden Phone
Controversial NSA whistleblower, Edward Snowden, teamed up with Andrew “Bunnie” Huang, a hacker currently suing the US Department of Justice challenging provisions in the Section 1201 of the Digital Millenium Copyright Act, to create a [...]
Pay to Play: Ransomware Hacking
Europol, the EU's law enforcement, has teamed up with Russian-based Kaspersky Lab and U.S. tech giant Intel to take strong action against the proliferation of ransomware attacks. Dubbed No More Ransom this cooperation of IT security [...]
Securing the Stocks: Rule 613 & the CAT
On May 6, 2010 the U.S. Stock opened lower and began an intraday downtrend with the Dow losing some 300 points until 2:42 p.m. EST. Then it proceeded to drop precipitously another 600 points over the [...]
Information Unavailable: DDoS Hacking
One of the more commonly-used types of attack tactics implemented by hackers is the Denial of Service (DoS) hack. At its base a denial-of-service attack is a hack that attempts to make a computer or [...]
Cyber Security Hot Topic: Cryptocurrency Security
Cyber Security Hot Topic: Cryptocurrency Security It's no secret the cyber security industry has taken note of cryptocurrency security and the issues surrounding it. The currency being untraceable and transactions being irreversible leads to many [...]
Cyber Degree and Certificate Roadmap
Cybersecurity is one of the most sought after careers in the world today. In high demand, cyber professionals are helping to ensure the safety of computer networks and systems in both the public and private [...]
Crowdsourcing Hackers for Better Security
Fiat Chrysler Automobiles is reaching out to the freelance community to entice white-hat hackers to aid the automaker in strengthening the cybersecurity protocols of its products and connected services by offering bounties to cybersecurity specialists [...]
Top 7 Cyber Degrees & Certificates To Further Your Career in 2018
Tangible skills for entering the cybersecurity field are often not found in a degree program -- but the business, management, strategy and communication skills you need to complement those tactical abilities are. While it is [...]
Boosting the Role of Women in Cybersecurity Through Soft Skills
The tech industry’s struggle with gender diversity is well-known, but the percentage of women in tech jobs — although just 25 percent — still dwarfs that of women in cybersecurity. Here’s a jarring statistic: There [...]
Cybersecurity in an International Market
While globalization has increased information sharing, it’s also made businesses and governments more susceptible to cyber crime. Since information assurance is an international issue, nations are finding ways to collaborate to enhance security globally. Technology has connected the [...]
The Future of Cybersecurity Education and How it Will Evolve: A Q&A with Myriam Dunn Cavelty
What opportunities exist in the current cybersecurity education sector? How can cybersecurity training be improved? Myriam Dunn Cavelty has the answers. cybersecurity education Cybersecurity training and education is evolving at a rapid pace, meeting the growing [...]
Your Career in Cybersecurity and How Soft Skills Can Boost Your Salary
Protecting classified data, foiling espionage plots and shielding computer networks from hackers might sound like the stuff of spy movies, but if you specialize in cybersecurity, these could all be in a day’s work. A [...]
Why Some Companies Are Turning to Black-hat Hackers for Cybersecurity
Some of today's top companies including Starbucks, Uber and Google are turning to reformed black-hat hackers to fill their cybersecurity skills shortage, with the rapidly evolving industry providing new – and legal – pathways for the next generation [...]
Q&A with Nigel Gibbons: How Businesses Can Prepare for Cyber Breaches
A lot of businesses would be unable to recover from a cyber attack if it hit them. Cybersecurity consultant Nigel Gibbons discusses how organizations can improve their cyber readiness and prepare for cyber breaches and attacks. According to [...]
Cyber Security a Chief Concern in Retail
The retail industry has taken some big hits in data security in recent years, and even with improved cyber security practices, it remains susceptible to cyber crime. Major retailers such as Target, Home Depot and Neiman Marcus [...]
Cybersecurity Recruiter Expert Reveals What You Need to Get Hired
Recruiting Cyber Security Professionals How do cybersecurity firms pick their newest hires for the best jobs? International cybersecurity recruiter Karla Jobling reveals the insider info you’ll need to get ahead. It’s no secret that demand for [...]
Cybersecurity in an International Market
While globalization has increased information sharing, it’s also made businesses and governments more susceptible to cyber crime. Since information assurance is an international issue, nations are finding ways to collaborate to enhance security globally. Technology has connected the [...]
Higher Education Learns Hard Lesson in Cyber Security
The higher education sector experiences some of the highest rates of cyber security incidents. Educational institutions have plenty of valuable data that makes them vulnerable to attacks. So how can they improve their cyber security [...]
Why Engineers Need Cyber Security Skills
While engineers have the skills to build and maintain complex systems, until now it wasn’t necessary to study cyber security as a framework of the job. That’s changing – and now, engineers need to understand [...]
Communication Among Top Soft Skills to Seek in Cybersecurity Education
According to the National Association of Colleges and Employers Job Outlook 2016 survey, the five most desirable attributes employers look for when seeking new graduates are soft skills: leadership, ability to work in a team, [...]
Cybersecurity Career Guide: Key Moves for Climbing the Ladder
Download the full guide as a PDF. When considering going for a management position, it’s critical to understand a cybersecurity manager’s typical responsibilities. They include monitoring operations and infrastructure, ensuring regulation compliance, auditing policies and [...]
What It Takes to Be a Cybersecurity Executive
For professionals looking to advance their cybersecurity career and make it to the executive level, technical skills and managerial experience alone aren’t enough to make it to the top. Cybersecurity is a business issue, not [...]
Cybersecurity Career Guide: How to Land a Senior Leadership Role
Download the full guide as a PDF. New cyber threats are constantly appearing, so people seeking senior leadership roles must stay abreast of current developments at all times. Unlike in other fields, where experienced [...]
Cybersecurity Career Guide: How to Advance Your Career at Any Stage
Download the full guide as a PDF. The cybersecurity field continues to grow rapidly, and the need for experts is increasing within virtually every industry. In fact, the sector cannot fill jobs fast [...]
Cybersecurity Career Guide: Advancing the Early Stage of Your Career
Download the full guide as a PDF. Those in the early stage of their cybersecurity career should start by mapping out where they’d like their career to lead. Job seekers should consider criteria such [...]
In Cybercrime Fight, CIA Hacking Isn’t a Big Worry – Simple Mistakes Are
When reports surfaced recently that U.S. federal agencies have the ability to spy on ordinary users via phones, TV sets and other online devices, outrage over "CIA hacking" sounded across the web. But why were so many [...]
The Top Cybersecurity Education Trends You Need to Know with Jessica Gulick
Jessica Gulick has not only witnessed the cyber security industry's astonishing growth, she’s played an integral role in the development of the next era of its professionals. As the vice president of the Women’s Society [...]
The Future of Cybersecurity Education: Craig McDonald Weighs In
Cybersecurity education and training is becoming even more important as threats continue to multiply. Cybersecurity expert and leader Craig McDonald believes that all IT professionals should invest in cybersecurity education. Craig McDonald founded Australian cybersecurity company MailGuard in [...]
Protecting the Underdog: Cyber Crime and the Small Business
Many small businesses don’t believe they have anything that cyber criminals might want to steal. Yet these companies are at as great a risk as others, if not greater. Cybersecurity professionals can help small companies [...]
Private Sector May Offer Better Cyber Security Salary, Benefits and Challenges
Private Sector Security Jobs Many private companies understand the value of strong cyber security, and qualified cyber security professionals are in great demand. Professionals looking for a higher cyber security salary, and other benefits, may [...]
Best Paying Cybersecurity Jobs and Where to Find Them
What salary could you get from your next, or first, cybersecurity job? The salary expectations and opportunities are different in various locations for the best paying cybersecurity jobs in this rapidly expanding sector. Cyber crime is on the rise, [...]
Cybersecurity and Its Role in Protecting Industrial Control Systems: A Q&A with Patrick Miller
Cybersecurity is a concern for all sectors, and the industrial control systems (ICS) industry is the latest to see an uptick in attacks. Whether it’s manufacturing, energy, oil or chemical plants, protecting the systems that run these operations is critical [...]
Information Security Is Key for Autonomous Cybersecurity Defense
The Need for Better Information Security The emerging future of military cyber information security technology involves machines that can self-direct, self-protect and self-evolve but what are the risks and benefits? More importantly, could these weapons [...]
The Best Schools for Cyber Security Degrees
Finding the Best Cyber Security Degree Program Considering expanding your IT qualifications with a cyber security degree? Discover some of the courses offered by the best cyber security schools in the country – and what [...]
Digital Warfare: Are State-Sponsored Cyber Attacks the Wave of the Future?
Countries have to do more than protect their borders these days; they have to protect their databases. State-sponsored cyber attacks are on the rise, and improving cybersecurity isn’t just about privacy — it’s about national security. It’s no secret [...]
How the Banking Industry is Fighting Cyber Crime
How Cyber Crime Affects the Banking Industry Cyber criminals are going directly to where the money is – the financial sector. Banks and financial firms are big targets for cyber crime, so the industry is stepping [...]
Information Security Is Key for Autonomous Cybersecurity Defense
The emerging future of military cybersecurity technology involves machines that can self-direct, self-protect and self-evolve but what are the risks and benefits? More importantly, could these weapons be turned against us? As automation advances, IT and [...]
How to Become a Highly Paid Ethical Hacker
Ethical hackers are in increasing demand as companies scramble to protect themselves from mounting cybersecurity threats. What's involved in this well-paid role and how do you become a white-hat hacker? Ethical – or white-hat – hackers could [...]
The Big Five Cybersecurity Risks Facing Smart Cities
Today’s smart cities may be underprepared for a range of cybersecurity risks, and must address key vulnerabilities before hackers exploit them. As cities rapidly deploy connected devices and big data to create “smart” networks, from [...]
Crisis Management: 7 Steps to Contain a Cyber Attack
How Large Corporations Can Contain a Cyber Attack Swift, decisive action is the key to containing a cyber attack. Find out how to limit the damage it can cause with this seven-step plan. With cyber crime [...]
From the U.S. to Europe and Asia: Cybersecurity Policies Around the Globe
Whether it’s a data breach, theft or a cyber attack, nations are facing constant threats to their networks. As a result, governments worldwide are implementing cybersecurity policies to combat rising cyber crime. Cybersecurity threats are a growing concern around [...]
Cybersecurity Career Advancement: How to Rise Through the Ranks in Cybersecurity
Many people studying information security want to know about cybersecurity career advancement. Find out how you can rise through the cybersecurity ranks and where a degree in the field could take you. Advancing through a cybersecurity career can seem like a [...]
Cyber Security and Its Role in Government. How Government Can Combat Cyber Threats
Cyber Security is Vitally Important for Government Organizations Discover how government data can be exposed and learn what’s being done to combat cyber threats. Government organizations are under constant threat from cyber crime. Unfortunately, they have so [...]
Web Encryption 2.0: A Q&A with Security Expert Scott Helme
Is web encryption just for sites with sensitive data? Security expert Scott Helme explains why every site needs this layer of cybersecurity, and how the industry is quickly adopting it. According to recent reports, about half of all web traffic is [...]
Censorship Around the World: When Does Global Cybersecurity Cross the Line?
Cybersecurity is necessary to protect governments around the globe from cyber threats, but what happens if cybersecurity oversteps its bounds and threatens freedom and privacy? Governments and other organizations around the world are bolstering their cybersecurity efforts, not [...]
Top Cybersecurity Interview Questions: What You Need to Know
So you’ve successfully completed your cybersecurity degree and want to use your newfound skills to get a well-paid cybersecurity job? First, you’ll need to answer the notoriously tough cybersecurity interview questions that could stand between [...]
Everything You Need to Know About Trump’s Cybersecurity Strategy
As cyber crime continues to rise, Donald Trump faces a serious challenge in getting this problem under control. Experts have their own ideas about what constitutes an appropriate response, but Trump’s plans to address the issue are yet [...]
Q&A with Troy Hunt: Why Big Businesses Fail at Cybersecurity
Data breaches are becoming more frequent and costly to organizations, and poor cybersecurity and unqualified professionals are often the culprits. So what can companies do to fix the problem? It seems like every week there’s news of [...]
Former White House CIO Discusses Government Cyber Security
Recent data breaches in government agencies have raised concerns about cyber security. Former White House chief information officer (CIO) Theresa Payton discusses the new challenges facing the government and the best way to deal with threats. If [...]
Addressing the Talent Shortage in Cyber Security with Jack Daniel
Is there Talent Shortage in Cybersecurity? According to a Cybersecurity Ventures report, there are one million job openings in cyber security and that number could grow to six million globally by 2019. Cyber security expert Jack [...]
Gain Critical Cyber Security Management Skills With an Advanced Cyber Security Degree
The role of a cyber security manager requires a complex set of skills above and beyond those required for entry- and mid-level cyber security professionals. A Bachelor’s degree and a few years of experience can [...]
Cyber Security and its Role in Law Enforcement and Homeland Security: A Q&A with Todd Rosenblum
Cyber security plays an essential role in law enforcement and Homeland Security. Todd Rosenblum is at the forefront of federal security and intelligence, and shares his thoughts on information assurance in law enforcement. For more [...]
3 Easy Ways to Protect Yourself from Cyber Crime on Cyber Monday
Cyber Monday is a happy hunting ground for hackers. Protect yourself from cyber crime next shopping season with these three simple steps. Cyber Monday is big business. In 2015, total digital sales that day topped $3 billion, going [...]
Hillary vs. Donald: Cyber Security and the President-Elect
Cyber security has been at the forefront of the U.S. presidential campaign. Not only has Hillary Clinton been in the hot seat for using an unsecured private email server during her time as Secretary [...]
Information Security Challenges and Presidential Politics
In recent years information security challenges have dominated headlines as hacking incidents at companies – such as Home Depot, Target and Anthem – become more prevalent. But 2016 seems to be the year of the political hack. [...]
The Next CSI: Digital Forensics in Cyber Security
"Digital forensics" is a broad term referring to the search for and detection, recovery and preservation of evidence found on digital systems, often for criminal or civil legal purposes. Digital forensics can sometimes involve the [...]
Combating Cyber Crime: Why You Need a Master’s Degree
The number of attacks against private businesses and governments is now reaching fever pitch, with the total cost of cyber crime set to reach $2 trillion by 2019. In the past, hackers have been able [...]
Top Cyber Security Threats That Hackers Love
Cyber security threats are becoming all to common and with each passing day, malicious hackers become smarter and more agile in their tactics. You don’t have to look far these days to find cyber security [...]
A Cyber Security Trick: Don’t Fall Victim This Halloween
Halloween may be the one night in the year when ghouls, ghosts and goblins routinely roam the streets, but in the brave new online world a litany of cyber security threats are constantly lurking just [...]
The 5 Leading Women Shaping the Cyber Security Sector
Cyber security is a high-demand field. There may be as many as a million job openings in cyber security worldwide. Postings are up 74 percent over the past five years. This also means there is a huge opportunity [...]
Why Smart Cyber Professionals Earn Their Cyber Security Degree Online
Cyber security is one of the fastest-growing technology fields and companies are desperately seeking top talent to fill a range of positions. This growth has sparked many seasoned professionals to pursue a cyber security degree, [...]
The Top Cyber Security Education Trends You Need to Know
Jessica Gulick has not only witnessed the cyber security industry's astonishing growth, she’s played an integral role in the development of the next era of its professionals. As the vice president of the Women’s Society [...]
The Watch List: Everyday Cyber Security Threats
You don’t have to look far these days to find cyber security news of hackers, cyber criminals and other hostile agents successfully compromising computer networks and systems for their own benefit. Here's a look at [...]
What Cyber Tricks You Should Look Out for This Halloween
Halloween may be the one night in the year when ghouls, ghosts and goblins routinely roam the streets, but in the brave new online world a litany of cyber security threats are constantly lurking just [...]
Are There Enough Women in Cybersecurity?
The first computer programmer was a woman – Ada Lovelace. Ida Rhodes designed the first computers to run the U.S. Census and Social Security systems. Margaret Hamilton wrote software that got Apollo 11 on the [...]
What You Need to Know: Risks of Cloud Services
Cyber crime costs the average U.S. company $15.4 million each year. Despite this, many companies are still lagging when it comes to protecting their data and cloud applications from cyber security threats including cloud cyber [...]
What Everyone Should Know About Data Protection
Ever known a mechanic who drives a car that’s in dire need of a service, or a builder who hasn’t finished his own house? It’s one of those ironies that some of us spend our [...]
[Infographic] How to Become a Chief Information Security Officer
Want to Be a Certified Chief Information Security Officer? Here's How As an industry experiencing double-digit growth, cyber security is becoming an increasingly important issue in all organizations. Below you'll find an infographic that covers [...]
Employers Have Higher (Degree) Demands for Cybersecurity Jobs
In July 2016, Intel Security and the U.S. Center for Strategic and International Studies (CSIS) released Hacking the Skills Shortage, a report outlining the talent shortage across the cybersecurity industry worldwide. Find out what the [...]
Why Healthcare Needs Cyber Security Professionals
Much of the focus in cyber security has been on individuals’ data accessed through retailers or government databases, but the healthcare sector is facing more pressing security needs than ever before for healthcare cyber security. Understanding the [...]
Major in Cyber Security or Specialize in Cyber Security: What Are My Options?
The demand for information security professionals is expected to increase by 53 percent through 2018, according to a Stanford University study. However, many cyber security jobs are unfilled, especially senior-level positions where vacancy rates are more than 50 [...]
Why Deidre Diamond Wants More Women in Cyber Security
When it comes to the leading women in cyber security, Deidre Diamond rises to the top. As Founder and CEO of CyberSN and #brainbabe, Deidre Diamond is influencing the culture of cyber security for women and men alike. With more [...]
Is the CISO the Most Important C-Suite Role?
As cyber security is becomes an increasingly important issue in all industries, so does the role of the chief information security officer (CISO). In 2015, 79 percent of businesses detected a security incident, and there has [...]
Tesla Motors Not Immune to Devious Hackers
Tesla Motors, known for wrapping their innovative long range battery technology in an attractive future-car shell, has recently become the victim/beneficiary of some white-hat hackers who displayed their research at the Def Con hacker conference [...]
The Feds Aren’t the Only Ones in the Warrantless Wiretapping Game
The modern world is exploding with new technologies that have the potential to radically alter human life on this planet both for the better and the worse. The burgeoning of surveillance technology has already begun [...]
A New Kind of Crime: The Cyber Criminal
The Cyber Criminal Think of the name Al Capone. You may associate him with a tommy gun or remember an anecdote someone told you about his life in Chicago. Point made – you know the [...]
The Spacebelt Information Ultra-Highway
Contributed by Jeffrey Sebranek Technological innovation in the modern world is beginning to move at breakneck speed. Unending reams of data are being generated by technologies ranging widely from CRM, social media, medical and financial [...]
LinkNYC Brought to you Free by CITYBRIDGE
Contributed by Jeffrey Sebranek So, what is the purpose of LinkNYC? The city of New York is among the premier cities in the world, yet there are still millions of New York City residents who [...]
Hacking as a Service in The Underground Economy
Contributed by Jeffrey Sebranek Gathering data is the gold rush of the 21st century, with Google/Alphabet Corp and Amazon leading the way in competing to create the largest database in history. These massive subscriber databases [...]
Women in Cybersecurity
From high-profile data breeches at big companies like Sony Pictures, Apple, and Target, to the thousands of small businesses that have reported cyber attacks, the vulnerability of the growing amount of digital data has become [...]
Borrowed your Friend’s Netflix Password? Don’t Worry, You’re Probably Not a Criminal, Just a Cheapskate.
Contributed by Jeffrey Sebranek The July 5, 2016 court case heard by the United States Court of Appeals 9th Circuit, has created a firestorm of controversy over the now potential illegality of friendly and familial [...]
DNC Gets Hacked
Contributed by Jeffrey Sebranek The 2016 DNC Hacking Two nebulous Russian hacking organizations have recently infiltrated the network of the Democratic National Committee, making off with emails, chats and a cache of opposition research on [...]
The Changing Face of Cyber Attacks: How Organizations Can Remain Vigilant
A lot has changed since the Morris worm was launched from MIT in November 1988, when then Cornell grad student Robert Morris made headlines for releasing one of the first Internet worms. Though this supposedly [...]
Career Advancing with Cyber Certifications
Contributed by Jack Roth Today, people from all walks of life use the Internet to communicate, work and play on a global landscape. This dynamic technology has changed society and has become the underlying fabric [...]
Business Email Compromise (BEC)
In this age of rapidly expanding technology, where the hacker persists one step ahead of the cybersecurity curve, business email compromise (BEC) remains a low-tech but highly lucrative card in the cyber criminal deck. According [...]
The Backbone of Bitcoin, the Blockchain, Seeks Fresh Applications
The blockchain is the technology created by Satoshi Nakamoto that underpins the cryptocurrency Bitcoin. While Bitcoin is beginning to take world by storm, blockchain applications other than cryptocurrency may just be the tip of the [...]