Cybersecurity Education

Cybersecurity Education: 7 Tips for Creating a Successful Career Pathway

The reality is self-evident: exponential advances in technology, the escalating complexity of systems, society’s increasing reliance on digital devices to manage daily tasks, and the global rise of significant threats posed by malicious actors ensures cybersecurity is here to stay. Government entities are struggling in their efforts to recruit and retain qualified personnel to staff…

Cybersecurity: Insider Threats

INSIDER THREATS: Can Cybersecurity Professionals Avoid the Train Wreck?

Most organizations have adopted some form of cloud implementation as part of their broader IT strategy. However, in a rush to gain a competitive edge and meet project deadlines, very few organizations have thoroughly thought through the security implications from an identity management perspective. That reality has the potential to negatively impact all of us…

Cybersecurity Training Programs

Cybersecurity: Where Economic Development and Stable Careers Align

COVID-19 has had a devastating impact over the last several months, negatively impacting our society on every level. The unemployment rate, while declining slightly in June, still exceeds 11%. Businesses of all sizes have experienced severe economic impacts, some of which will never open their doors again post-COVID. The number of personal tragedies and losses…

Biometric Keystroke Dynamics

Keystroke Dynamics: The Benefits of Behavioral Biometrics

Keystroke dynamics is the detailed timing information which describes when each key was pressed and when it was released. This method is considered to be a “behavioral biometric” that measures an individuals’ manner and rhythm of typing and uses the data to create a template of the unique typing pattern. The dwell time (amount of…

Handling Malware

7 Tips to Reduce the Risk of Handling Malware

Many people call any program that an attacker uses to their advantage, including publicly available tools, “malware.” That is not a good practice as the term “malware” is far too generic and makes its handling much riskier than needed. Further categorizing the malware better identifies the attackers’ goals and answers the question, “What does the…

Disaster Response: Recovery Site Seating

Disaster Recovery: 5 Tips to Avoid the “Game of Thrones”

When any type of disaster takes an organization offline and disrupts its critical functions, incident response teams scramble to address the issue. While IT attempts to reinstate data and communication capabilities, it may be necessary to activate a secondary recovery site. Astute leadership will have prioritized and allocated obvious resources well in advance. But did…