Nov 9, 20184 minDistributing malware inside Adobe PDF documents Distributing malware inside Adobe PDF documents is a popular method for attackers to compromise systems. Within the latest versions of...
Nov 9, 20183 minThe Main Cyber Security Threats That You Need to Be Concerned About Whenever there is a technological development, a cyber-security threat usually isn’t far behind. So, considering the current state of the...
Nov 9, 201810 minSecurity Frameworks…Useless?I was recently in a very high-cost (around $6K), one-week security course in San Francisco. You can infer the institution. The instructor...
Nov 9, 20187 minUnderstanding and Preventing Cyber Fraud and Cyber Attacks with Advanced Big Data Cyber SecurityCyber Fraud Affects 5 Percent of the Planet’s GDP The Association of Certified Fraud Examiners (ACFE) estimates typical organizations...
Nov 9, 20184 min 5 Tips to Start a Lucrative Career in Cyber SecurityInformation Security professionals are akin to our policemen. They are equipped with advanced firewalls and porn filters, secure email...
Nov 9, 20189 minCore 4 “Back to the Basics”In light of all the cyberattacks that have been well publicized as of late, we see the increasing need for skilled IT security resources...
Nov 9, 20182 minFISMA and Cyber SecurityFISMA is the Federal Information Security Management Act of 2002. The goal of FISMA is to encourage and to hold government agencies in...
Nov 9, 20182 minCreating custom dictionary files using CeWLMost people incorporate commonly used words as their passwords. Studies show when people select random passwords, there is very little...
Nov 8, 20182 minEnable SSH on Kali Linux Enable SSH on Kali LinuxKali Linux does not come with SSH enabled. SSH is the preferred method of remote management for most Linux based systems. Secure...
Nov 8, 20188 minThe Security profession: Offense vs. DefenseLately there has been some articles and conversations around the security profession, particularly the ‘how to get started’ aspect. My...
Nov 8, 201810 minGetting started with a career in Cyber Security and Information SecurityThe Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get...