First off I would like to thank Anshu Gupta for allowing us to republish his article. Anshu has experience working at some of the biggest names in tech here in the USA and has sat on both sides of the table so his insight is invaluable. When I read it I thought it had some great advice…

Read More

T-Mobile. Home Depot. Target. California State University. All are large organizations that fell victim to expensive data breaches because of a third-party vendor, nor are they alone in that list! For any small to medium-sized business (SMB), there are two very important points to be aware of: 1) Small companies are, in fact, targets. Whether they…

Read More

When hacking exploits had been leaked from the NSA last month, it offered a hacking toolkit to anyone in the world who wished to try to use them. The companies responsible for the effected programs, such as Microsoft, had immediately scrambled to update – or had, in fact, already provided updates – to defend against these…

Read More

Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day exploits have been buzzing in the news in the wake of the Wikileaks concerns, where a number of such exploits had been posted where any who were interested could learn illegally about how to use them. Many are worried about…

Read More

Phishing Scams Thrive on Deadlines and Fear Tax returns are soon due on Tuesday, April 18th, 2017, and with that looming deadline, the pressure is on to have everything done and filed correctly. All paperwork in order? All taxes accounted for? Employees all have their W-2s? It is a pressure that phishing scammers thrive upon.…

Read More

2016 has been a year, to say the least. With the loss of legends like David Bowie, Prince, Alan Rickman and Mohammad Alli, and of course a tumultuous presidential election leaving much of the nation divided, we’re just about ready to put this year to bed. However, we still have the better half of December…

Read More

Is This a Resume or a Novel? 5 InfoSec Resume Tips I’ve come to the realization that we have many budding writers masquerading as Information Security professionals out there. Today, my InfoSec staffing company received a fifty-five page resume from a candidate. I’m not joking – 55 pages! In eighteen years of recruiting, this is…

Read More

Taking a Look at Cybersecurity’s Future in Legislation With the presidential debates behind us, and the election day looming, the issue of cybersecurity still remains largely untouched. While a passing topic at some point in each of the debates, the only direct question ever addressing the issue was from the first debate. Moderator Lester Holt…

Read More

Are our constructed identities on social media feeding on others insecurities? Social Media’s Distortion of reality and the effect it’s having on you and your privacy.

Read More