Blog
How do I Know What a Data Breach Looks Like?

How do I Know What a Data Breach Looks Like?

Arguably no phrase has dominated the tech world the last 24 months more than the term “data breach.” From breaches that have impacted critical infrastructure like the Colonial Pipeline to hackers compromising healthcare records at UC San Diego Health, the last two...

Stay Cyber Secure in 4 Easy Steps

Stay Cyber Secure in 4 Easy Steps

If you’ve ever felt overwhelmed with the amount of negative news around cybersecurity, you’re not the only one. Cybersecurity has become one of the biggest hot topics both inside and outside of technology circles over the last two years. From securing learning devices...

Why We Should Communicate Cybersecurity Self-Efficacy

Why We Should Communicate Cybersecurity Self-Efficacy

Our words matter. It’s an interesting statement for the cybersecurity profession, isn’t it? But it’s true. Technical skills are necessary, as are discipline, curiosity, and good character. And so are our words: they frame the context of our cybersecurity goals....

Aksoy’s Cisco and 5 Tips to Avoid a Scam

Aksoy’s Cisco and 5 Tips to Avoid a Scam

Not all cybersecurity dangers come from hackers. Some come from a man in Florida with fake Cisco network devices. Onur Aksoy, a.k.a. ‘Ron Aksoy’ or ‘Dave Durden,’ has been charged with importing fake networking devices from China and Hong Kong, selling them, according...

3 Reasons to Upskill This Year

3 Reasons to Upskill This Year

Recent media buzz about tech layoffs at Coinbase or other tech businesses gives us an excellent opportunity to think about what it will take to stay marketable in the cybersecurity industry. Even though CompTIA reports that the “projected growth rate for tech jobs...

Cybersecurity and Hacktivism: Where’s the Line?

Cybersecurity and Hacktivism: Where’s the Line?

We train people to hack. Should we? Between hacktivists siding with Ukraine and going rogue against Russia, a single hacker taking down the entirety of North Korea’s internet in retaliation, and the new GoodWill ransomware virus that holds data ransom and demands good...