Admittedly the vast majority of my technical background is on the Windows side. Like many of you I’ve spent years in the field and through training courses improving my Windows skills and gathering a bunch of certifications from Microsoft. Windows is powerful and ubiquitous. I have a great time working in Windows networks and teaching Microsoft courses. But sometimes we all need to broaden our horizons.
Read More »about Fun with Kali
We are very proud of our NIST CSF courses. The reviews have been fantastic! Many organizations take that knowledge and create or improve a cybersecurity program on their own. In the Bootcamp/Practitioner classes we get very specific as to what that program could contain and how it might be organized.
However, we’ve heard from clients that they want more. They need a partner to come alongside and help them through the process of discovering exactly where they are in cybersecurity. What’s going well, what are the gaps and what should be done to close them?
Read More »about Are You Ready To Assess The State of Your Cybersecurity?
It's time to give SharePoint a second look; chances are you'll be using it in the very near future. Reports are showing that approximately 80 percent of Fortune 500 companies are using this multi-platform collaboration tool. Why?
Read More »about It’s Time To Give SharePoint a Second Look!
Cyber security breaches are a huge expenditure in today’s internet-based world; therefore, it’s incumbent upon organizations to invest in prevention rather than just recovery from a security breach.
Read More »about Microsoft 365 Threat Intelligence
Big data and the process of turning raw information into meaningful reporting and visualization has seen huge growth by companies focused on data driven decision making. Just this year alone, many of my enterprise accounts have shown a specific interest on how to better use data for making business decisions based on historical, real-time and predictive analytics.
Read More »about Business Analytics with Microsoft Power BI
EC Council upped their game with the release of the Certified Ethical Hacker v10 course! Not only does it now cover how to defend IoT devices but there is a strong focus on cloud computing threats.
Read More »about To Beat a Hacker You Need to Think Like One!
Amidst all the different security technologies, such as firewalls, antivirus, encryption, etc. an entire critical category, which may be the most important, becomes either an afterthought or even ignored. In fact, without careful work in this area your other security devices and applications will be ineffective.
Let’s be clear. Organizations who fail in this area are many times more likely to suffer a costly data breach. Not 50% more likely, or twice as likely but a breach becomes an almost certainty.
Read More »about Miss This and Your Cybersecurity Program Will Fail
If you are already using PowerShell to automate and quickly solve tedious administration tasks, let us help you expand your PowerShell foundational knowledge!
Read More »about PowerShell scripting is a sought-after skill!
A few weeks ago I was speaking to a client about the need for antivirus as called for in the Payment Card Industry Data Security standards (PCIDSS) Requirement 5: Protect all systems against malware and regularly update antivirus software or programs. He made an unusual statement, “We don’t use antivirus.”
Having been in IT and cybersecurity for many years I knew this was eventually coming, but it was the first time I’d seen it in a real-world implementation. Here are some facts:
Read More »about The End of Antivirus?
The CompTIA CySA+ Cybersecurity Analyst course is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. CySA+ is the most up-to-date security analyst certification that covers advanced persistent threats in a post-2014 cybersecurity environment.
Read More »about Do You Need to Renew Your CompTIA Security+ Certification? Consider CySA+