Application security April 26, 2023 Nitesh Malviya DevSecOps: Continuous Integration Continuous Delivery (CI-CD) tools In the last piece, we went through the various tools that can be integrated into the DevOps Pipeline to implement security at the different stages of the software...
News April 24, 2023 Dan Virgillito 3CX hackers hit critical infrastructure and secondhand routers cause security concerns Hackers behind the 3CX attack hit critical infrastructure, researchers discover secondhand routers with corporate secrets and the GhostToken GCP flaw. Catch...
General security April 24, 2023 Gilad Maayan What is Security Service Edge (SSE)? Learn about Security Service Edge, or SSE, a security solution that can protect your business’s network and data.
Professional development April 19, 2023 Tyra Appleby Computer forensics interview questions Computer forensic investigators are in high demand. Often referred to as digital forensics engineers, computer forensic investigators are expected to know basic...
News April 17, 2023 Dan Virgillito Hyundai data breach and Microsoft’s warning to accountants Hyundai data breach exposes sensitive customer data, Microsoft warns accountants of phishing near Tax Day and the Goldoson Android malware. Catch all this and...
Professional development April 17, 2023 Greg Belding The digital security forensic analyst salary guide One of the fastest-growing areas of information security is digital security forensics. With so much activity in today’s world taking place in the digital...
News April 11, 2023 Dan Virgillito Western Digital cloud breach and the MSI ransomware hack Western Digital cloud services hit by massive data breach, car owner sues Tesla over privacy intrusion and the MSI ransomware attack. Catch all this and more...
News April 3, 2023 Dan Virgillito TMX loan data breach, Italy bans ChatGPT and WordPress Elementor Pro exploit High-cost lender TMX announces data breach affecting millions of customers, hackers actively exploit vulnerability in the Elementor Pro WordPress plugin and...
Professional development March 31, 2023 Patrick Mallory Applying linguistics to cybersecurity: The journey of Jade Brown, a 2022 Infosec Scholarship winner Jade Brown, 2022 Infosec Scholarship winner, builds on her Linguistics and East Asian Studies knowledge to grow as a Cyber Threat Intelligence Analyst.
Other March 30, 2023 Daniel Brecht Average SCADA Security (CSSA) salary What is SCADA? Supervisory Control and Data Acquisition is one of the most interesting areas of Industrial Control Systems (ICS) and refers to the hardware...