As a non-technical person working in the cybersecurity industry, I often find myself asking, “Do I need to be worried about [insert novel threat]?” I am almost always pleased to learn that the experts have considered these threats and created simple protective measures so that no, I do not necessarily need to be worried about [insert novel threat]. In taking a few simple precautions, you might never need to worry about these intimidating cyber risks ever again!
Working from home is becoming the “new normal” for many people affected by the global pandemic. As we get more comfortable meeting via video chat and tuning out the sound of the dishwasher, it is important to stay aware of the risks that threaten the privacy and security of yourself and your organization. Misconfigurations on your machine or perimeter network could leave your data exposed to dangerous cybersecurity threats. In an ideal scenario, your company would provide you with a managed device, pre-configured with security software and controls, but that can be prohibitively costly or significantly increase administrative overhead.
One of the more difficult and time-consuming projects in info-sec is data classification. It’s especially difficult if you’re on a budget - which every company is. When an organization is fairly new to the security and risk driven mindset and must prioritize their efforts to achieve the most bang for their buck; Data Classification is often near the bottom of the list.
A guide to creating challenging, educational, and enjoyable vulnerable virtual machines.
Picture this, you've just completed another machine on TryHackMe, Vulnhub, or HackTheBox and you're left thinking to yourself "well I'd quite like to build one of those for myself" but then you realize that you don't have any idea of where to start. Fear no more! In the following post, we'll break down the core ideas behind creating an excellent box.
New to the world of cybersecurity and wondering where to even begin? Ever wonder what it takes to become a professional hacker? Varying levels of IT knowledge and understanding? Everybody must start somewhere, and here is your chance! Reimagine your career as an Information Security Specialist and stop wasting your time with "what ifs." Allow yourself to grow and shine in a field that you are passionate about. Outreach your potential with this fantastic new course!