Category Archives: Ethical Hacking

Top Ethical Hacking Books

How does a security specialist learn the tricks of hackers? Fortunately, there are several books available which provide guidance on how to be a “white hat hacker” so as to secure your own computer network. Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, IT and Computer Security, Security Certification, Training and Education, Uncategorized | Leave a comment

Businesses Must Be Proactive With Cyber Security Policies

Security breaches and intrusions have been in the spotlight as businesses across several sectors have reported damaging intrusions into their networks. Many of these have resulted in the theft of consumer personal data, or even worse, sensitive government information. Unfortunately, … Continue reading

Posted in Cyber security, Ethical Hacking, Training and Education | Tagged , , , | Leave a comment

Increase your chances of earning that Big Customer’s business with an assessment from a cyber-security expert at Superior Solutions

It’s a dubious honor at times to be the owner of a SMB: the operational concerns remain top-of-the-mind 24/7. No surprise, then, that hackers continue to focus their cybercrime on the ‘low hanging’ fruit offered by the softly-defended likes of … Continue reading

Posted in Cyber security, Ethical Hacking | Tagged , , , , , | Comments Off on Increase your chances of earning that Big Customer’s business with an assessment from a cyber-security expert at Superior Solutions

Ethical Hacking is Used to Beat Cyber Criminals

The theft of customer data that is used by hackers for financial gain requires companies to ensure their data is protected. This is done using ethical hacking that tests the security of current IT infrastructure. The ethical hacking of your … Continue reading

Posted in Cyber security, Ethical Hacking | Tagged , , , , , | Leave a comment

Hackers feed on the lack of penetration testing and security audits

Network and software security? Hacker’s feed on the lack of it. They live for the challenge of finding vulnerabilities, and they know when and how to accomplish their cyber intrusions just when you think your audits are trustworthy. The legacy … Continue reading

Posted in Ethical Hacking | Tagged , , , , | Leave a comment

Cyber security can be enhanced with training

When protecting the data that is stored and manipulated within your company’s computer system, no effort is to small. Making sure you have adequate cyber security is essential. One way to increase your cyber security is to make sure your employees … Continue reading

Posted in Cyber security, Ethical Hacking, Security Certification | Tagged , , , , | Leave a comment

Identify IT Vulnerabilities with a Security Assessment

The IT infrastructure for a business may have hidden vulnerabilities that can expose data to many types of risks. One way to identify vulnerabilities on a system is to perform a security assessment. A strategic company that can perform ethical … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, IT and Computer Security | Tagged , , , , , , | Leave a comment

Cyber Security Bill Stalled… But Sponsors Still Push On

Cyber security continues to be an ongoing challenge with no easy answers… Earlier this month, the senate failed to pass a bill known as the Cybersecurity Act of 2012.  The sponsors of the bill are still pressing the issue with … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , | Leave a comment

Cyber Bodyguards

The concept of cyber bodyguards may seem far-fetched, but it’s something that corporate America already has adopted.  CEO’s, business owners, and companies working through mergers, acquisitions, and IPO’s routinely use. This is one area where Hollywood has lagged behind. Celebrities … Continue reading

Posted in Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment

Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , , | Leave a comment