New (ISC)² post on how the “New Collar Jobs Act” can support cyber security jobs
New Collar Jobs Act Can Support Cyber New Collar Jobs Act Can Support Cyber For years, many in the United States have viewed the traditional four year degree as the…
New Collar Jobs Act Can Support Cyber New Collar Jobs Act Can Support Cyber For years, many in the United States have viewed the traditional four year degree as the…
Cyber experts were blocked in their push to patch voting systems in 2016 Cyber experts were blocked in their push to patch voting systems in 2016 Cybersecurity experts on a…
Thor Pedersen's answer to "How difficult is CISSP?" - Quora Thor Pedersen's answer to How difficult is CISSP? - Quora How deep is the ocean? /smartass off. It really depends…
NSA Crypto challenge of the week! https://www.facebook.com/NSACareers/app/1541913382708799/
The CCleaner hack: Who is affected: People who have downloaded CCleaner version 5.33.6162 32-bit version download between August 15th and September 12th. If I have a 64-bit PC could I be…
Entrapment and Enticement: Entrapment (Illegal and unethical): When someone is persuaded to commit a crime they had no intention to commit and is then charged with it. Openly advertising sensitive…
Evidence: How you obtain and handle evidence is VERY important. Types of evidence: Real Evidence: Tangible and Physical objects, in IT Security: Hard Disks, USB Drives – NOT the data on…
Legal and regulatory issues. As IT Security Professionals we need to understand that laws and regulations have a huge influence on how we work. We need to know some of…
Equifax has without notifying anyone updated their breach FAQ, now saying that it was breached using a vulnerability in Apache Struts. "We know that criminals exploited a U.S. website application…
The US Department of Energy (DOE) has announced 20 cybersecurity projects aimed at enhancing the reliability and resilience of the American electric grid, and oil and natural gas infrastructure through…