This website uses cookies to ensure you get the best experience on our website. Learn more

Cybersecurity Articles

Computer Security Feature Essays

Jack Barundi
Jack Barundi
Jack Barundi's Blog

Why it's Essential to Backup Microsoft 365

Backing up files and apps is a critical aspect of modern computing and is especially important when using Microsoft 365.

An Integrated Approach to Cybersecurity Using a Purple Team

Purple teams in cybersecurity are an effective way to improve the security of an organization's information systems.

The Goals of Red Teaming

Red teaming is a method of evaluating the effectiveness of a security system, organization or plan by simulating an attack from an adversary.

Key Components of an Incident Response Plan

An incident response plan is a set of procedures and guidelines that organizations put in place to prepare for and respond to various types of security incidents.

A Few Interesting Statistics with Regard to Ransomware

According to a report by the Cyber Threat Alliance, the number of ransomware attacks increased by 350% in the first half of 2020 compared to the same period in 2019.

Key Components of Information Security

Information security is the practice of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

Leading Security Awareness Training Organizations in the U.S.

The field of security awareness is a critical aspect of modern business operations, as companies must protect their networks and data from a wide range of cyber threats.

Key Security Features of Window 11

Microsoft Windows 11 is the latest version of the popular operating system that is used by millions of people around the world.

How Blue Teaming Works

Blue teaming is a method of evaluating the effectiveness of a security system, organization or plan by simulating defense against an attack from an adversary.

Do you wish to contribute a technical article on cybersecurity? If so, you'll get your own blog category on our site and your posts may be shared across our IT Specialist Network platform including social networks. Click to read the guidelines.