Zero Trust
This blog describes what zero trust is and what you need to think about if you are wanting to go that route.
This blog describes what zero trust is and what you need to think about if you are wanting to go that route.
In this post we explain what goes into a good vulnerability management program, to keep it blog length it is rather high level.
Explanation of what encryption is, how it works and where is it used as well as the CIA triad is, in common every day English.
Ransomware is type of self-propagating malware that encrypts your files so that you cannot read or use them until you pay a ransom. Yeah, I… Read More »WHAT IS RANSOMWARE
HOW TO PROTECT YOURSELF FROM RANSOMWARE Protecting yourself from ransomware falls into two main buckets, first is steps to take to avoid getting infected, second… Read More »Ransomware Protection and Importance of Backups
I see many posts on social media asking for advice on how to get started in cybersecurity, what certifications to get, etc., so I figured… Read More »Cybersecurity Career and Certification Advice
In this article we go over the need to for good password management. We’ll discuss all the best practices and how to implement them.
This article was written with companies in mind; most of this applies to individuals as well. Most security incidents happen due to phishing, and I… Read More »Let’s go phishing
In this blog post, I want to talk about risk management and the concept of threat modeling. Let’s start with some basic math, then dive… Read More »Risk and threat management
Today I want to talk about online privacy concerns. When it comes to online privacy, I tend to take a slightly different road than many… Read More »Online Privacy concerns