Tyra Appleby

Tyra Appleby is a CISSP certified lover of all things cybersecurity. After serving 4 years in the Navy as a Cryptologic Technician, she continued supporting various DoD and government agencies as a Systems Security Engineer. She has a passion for writing and research, particularly in the areas of Reverse Engineering and Digital Forensics. When she’s not working, you can find her at the beach with her Rottweiler Ava.
Tyra Appleby

How to pass the CompTIA Security+ exam: Tips & resources

Prepare yourself or your team for the CompTIA Security+ certification exam with our top recommendations, tips and resources for passing your first try.

Computer forensics interview questions

Computer forensic investigators are in high demand. Often referred to as digital forensics engineers, computer forensic investigators are expected to know ba

10 tips for Certified Ethical Hacker (CEH) exam success

Looking to take your CEH exam soon? Here are 10 tips to help you succeed.

Top 25 Security+ Interview Questions [Updated 2021]

Find tips on how to answer some commonly asked questions during the Security+ interview and how to prep.

55 federal and state regulations that require employee security awareness and training

Introduction Humans are repeatedly described as the weakest link in the cybersecurity chain. We are highly susceptible to falling for phishing attacks, soci

What does CMMC mean for DoD contractors?

What is CMMC?  The Cybersecurity Maturity Model Certification (CMMC) is a new framework and certification process instituted by the government to document a

Security in a Blue Data Background Illustration

Security controls for ICS/SCADA environments

Introduction  An Industrial Control System (ICS) is any technology used to control and monitor industrial activities. Supervisory control and data acquisitio

Pretty female soldier working with laptop while sitting at table in headquarters building

Best entry-level cybersecurity jobs for veterans with security clearance

Introduction Military veterans have a variety of in-demand skill sets that make them highly desirable candidates for some of the fast-rising cybersecurity po

Pretty female soldier working with laptop while sitting at table in headquarters building

How to get security clearance and win more contracts

Introduction Having a security clearance can increase your job options and make you a more sought-after employee. An individual is not authorized to obtain a

Speech bubble illustration of information technology acronym abbreviation term definition SCADA Supervisory Control and Data Acquisition

ICS/SCADA Security Technologies and Tools

Introduction Industrial Control System (ICS)-embedded architectures differ from standard enterprise systems. ICS are interconnected, like enterprise systems,

Two maintenance engineers inspect relay protection system with laptop computer. Bay control unit. Medium voltage switchgear

Account Management Concepts for ICS/SCADA environments

Introduction Industrial Control Systems (ICS) are part of the Supervisory Control and data acquisition environments. These systems are responsible for the in

Woman with a tester and a printed circuit board

Access Control Implementation in ICS

Introduction Industrial Control Systems (ICS) differ from traditional information technology (IT) systems, making the implementation of certain security cont