Industry insights November 7, 2022 Drew Robb API security best practices: What you need to know APIs have become the new network, but their changing role has made them vulnerable to abuse. Learn how to secure them.
Hacking November 1, 2022 Bianca Gonzalez Wi-Fi password hack: WPA and WPA2 examples and video walkthrough Infosec Skills author Mike Meyers demos a Wi-Fi WPA key hack. He uses Aircrack-ng and Airodump-ng to access 802.11 WPA and WPA2 connections.
Industry insights November 1, 2022 Drew Robb Hiring a virtual chief information security officer Is hiring a virtual chief information security officer right for you? Find out how remote-based vCSIOs are changing how C-level execs are hired.
News October 31, 2022 Dan Virgillito Drinik malware returns, CISA unveils critical performance goals and rise in global data breaches Drinik malware returns on Android, CISA announces cybersecurity performance goals for critical infrastructure and the rise in global data breaches.
PMP October 31, 2022 Daniel Brecht Certifications compared: PMI’s PMP versus CompTIA’s Project+ When browsing through job opportunities, you might notice that several positions require project-related skills. The project management-oriented labor force,...
Other October 27, 2022 Daniel Brecht Average CompTIA Linux+ salary [2022 update] With open-source talent increasingly difficult to find, it’s an excellent time to be in this field. According to The Linux Foundation’s 10th Annual Open-Source...
Network security October 26, 2022 Dan Virgillito Security engineers: The top 13 cybersecurity tools you should know Security engineers utilize a range of tools to prevent cyber threats. These are the top 13 tools security engineering industry leaders are using now.
News October 24, 2022 Dan Virgillito Microsoft data breach, CISA FIDO push and cybersecurity worker shortage | Cybersecurity Weekly Microsoft confirms data breach, CISA encourages Fast IDentity Online (FIDO) adoption and the growing cybersecurity worker shortage drives larger salaries.
Malware analysis October 19, 2022 Pedro Tavares Chrome extensions used to steal users’ secrets Learn how Chrome extensions are being used for nefarious purposes.
Industry insights October 18, 2022 Susan Morrow Considerations when using open source to build an identity system Identity systems are often complex. Can open source software help to take the load off developers to build an interoperable, secure, and usable digital identity?