Hacking Humans with Nanotechnology

Hacking humans with nanotechnology may sound like a concept from a futuristic science fiction novel or movie, but the truth is, it's not that far off and it could be the next big cyberthreat. If you thought data breaches involving your social security number or credit card information were scary, imagine the ramifications nanotechnology hacking.

Certified CISO Training: What's In It For You?

It happens across industries, from refrigerator repair to software sales. You get good enough at your job, you get promoted to management and then become an executive. The field of information security is no exception. What skills do you need to be an effective CISO and what is the Certified CISO program? This blog covers these topics.

How Secure are Medical Devices?

This blog features an interview of Alpine Security’s CEO, Christian Espinosa, on medical device security by Caroline Cornell, originally posted at classaction.com. Medical devices have largely been neglected from a cybersecurity perspective. Many of these devices run legacy operating systems, are full of vulnerabilities, and were not intended to be connected to hospital networks.

A Penetration Testing Career – Do You Have What It Takes?

Penetration testing, also known as ethical hacking, is one of the hottest jobs in tech today. What other career lets you pretend you're in The Matrix, working your way into systems like a top-level hacker, all without breaking any laws. Oh, and you're getting paid for it.With a real-world penetration testing job, though, you're not just playing at hacking into systems. You actually are hacking into systems, and your employer's very existence may depend on your ability to do it.

Leetspeak: The History of Hacker Culture's Native Tongue

You've probably seen leetspeak, also known as 1337 or “l33t,” somewhere on the Internet or in a movie about computer hacking. It's essentially regular English, but with more hacker slang and with certain letters changed to numbers. In this blog, we cover the history of leetspeak and how it applies to you.

Top Penetration Testing Certifications

Penetration testing, also known as pen testing, is an ethical hacking tactic that helps companies protect themselves. Penetration testers try to break into clients' digital systems to find weaknesses before a black hat hacker does. This is a growing field as companies seek to prevent the high profile data breaches that have happened in recent years. The top penetration testing certifications can help you get into this field.

The History of Penetration Testing

Penetration testing has been around since human beings first began trying to understand their enemies' thought processes. Ancient armies all over the world conducted mock battles and games to figure out how other armies might undermine their strategies or get around their forces. This continued for centuries upon centuries until, inevitably, the tech world got in on the act.

Most Dangerous Hacked Medical Devices

Hacked medical devices could be the next big security nightmare. There are currently between 10 and 15 connected devices per hospital bed in the United States, many of which are vulnerable to attack.

How to Perform a Cybersecurity Risk Assessment: A Step-by-Step Guide

Organizational leaders must understand that comprehensive, risk-based decisions are vital to balancing the force multiplying effects of information systems with the risk of those systems being inherently vulnerable to exploitation. If you want to prevent or reduce the likelihood of an attack, you have to risk management strategy: how your organization will frame, assess, respond to and monitor risk over time.

PenTest+ vs CEH Certifications: What's the Difference?

When it comes to becoming an IT penetration testing professional, you have two main certifications to start your ethical hacking journey: the Certified Ethical Hacker (CEH) certification or the CompTIA PenTest+ certification. This article discusses the primary differences between the two.

Security+ Training and Certification: Its Value for Cybersecurity Professionals

A great way to get ahead in a cybersecurity career is to secure a credential. One of the most popular is the CompTIA Security+ certification. Don't be intimidated by the thought of the test! There are ways to prepare and it is actually a very approachable credential for a beginning professional. Here are the answers to a few FAQ's that candidates often have.

Top 10 Reasons Why CompTIA Security+ Training is Right for You

One of the most widely accepted and highly regarded accreditations is the CompTIA Security+ Certification. From financial benefits to career pathways to instant industry recognition, the CompTIA Security+ Certification is the smart choice for anyone who is serious about getting ahead. Here are ten reasons why the CompTIA+ Training is worth serious consideration.

DoD 8570: How the Military Handles Data and Why It Matters

Several years ago, the DoD passed a regulation, DoD 8570, which stated that all Information Assurance (IA) personnel were required by law to be compliant. Certification is necessary to work with this data, whether that be DoD staff, contractors, or partners.  

GDPR Overview and Compliance

GDPR will affect any business that has access to, or has the ability to process, personal data of any EU resident. In other words, if your business sells small kitchen tools online, and you sell to European customers, your data collection and privacy practices will be impacted by GDPR. This regulation will become mandatory for any company that deals in Europe, regardless if the business is located inside or outside the European Union. GDPR is slated to go into effect on May 25, 2018.

Web Application Penetration Testing: Why It’s Necessary and What You Need to Know

Web applications are the critical systems of many networks. They store, process, and transmit data. They are also vulnerable to hackers who can find vulnerabilities. So, the question becomes how secure is your network? And how comprehensively has it been tested?