This website uses cookies to ensure you get the best experience on our website. Learn more

Cybersecurity Blogs

Computer Security News & Opinion

Article Listings

View All or By Author & Category

The Goals of Red Teaming

Red teaming is a method of evaluating the effectiveness of a security system, organization or plan by simulating an attack from an adversary.

The National Security Agency's Role in Cybersecurity

The National Security Agency (NSA) is a U.S. intelligence agency that is responsible for the collection and analysis of foreign communications and foreign signals intelligence.

Nation State Cybersecurity Threats

One of the most significant nation-state cybersecurity threats is advanced persistent threats (APTs). APTs are long-term, targeted attacks that are often carried out by nation-states or state-sponsored hacking groups.

How Cryptocurrency Poses a Threat to Cybersecurity

Cryptocurrency, also known as crypto coins or digital currency, has gained popularity in recent years as a decentralized form of currency that operates independently of governments and financial institutions.

Bio: Who is Kevin Mitnick

Kevin Mitnick is a computer security consultant, author, and reformed hacker. He gained notoriety in the 1990s as one of the most wanted computer criminals in the United States.

Bio: Who is Stu Sjourwerman

Stu Sjouwerman is a cybersecurity expert and the founder and CEO of KnowBe4, a company that provides cybersecurity awareness training and simulated phishing attacks to organizations.

Bio: Who is Brian Krebs

Brian Krebs is an investigative journalist and cybersecurity expert, known for his coverage of cybercrime and computer security issues.

Prominent Phishing Attacks that Have Occurred Over the Past Five Years

Phishing attacks have been a prevalent and ongoing problem for the past several years.

The Significance of Vulnerability Management

Vulnerability management is an essential aspect of network security that involves identifying, assessing, and mitigating the vulnerabilities present in a network.

Key Aspects of Encryption

Encryption is the process of converting plaintext, or readable information, into an unreadable format known as ciphertext.

The First Steps to Take After Being Hit with a Ransomware Attack

Ransomware attacks are a growing threat to organizations of all sizes, and it is essential to have a plan in place to deal with them.

Key Components of an Incident Response Plan

An incident response plan is a set of procedures and guidelines that organizations put in place to prepare for and respond to various types of security incidents.

Bio: Who is Roger Grimes

Roger Grimes is a well-known cybersecurity expert and author. He has been working in the field of computer security for over 30 years, and is considered one of the leading experts on the subject of computer defense and security.

Top Twenty Most Influential People in Cybersecurity

Cybersecurity is a rapidly growing field that is vital for the protection of individuals, organizations, and governments from digital threats.

The Most Significant Corporate Mergers in Cybersecurity Over the Past Decade

The cybersecurity industry has seen a significant number of mergers and acquisitions in recent years, as companies look to expand their offerings and gain a competitive edge in the marketplace.