Category Archives: Training and Education

Cyber Bodyguards

The concept of cyber bodyguards may seem far-fetched, but it’s something that corporate America already has adopted.  CEO’s, business owners, and companies working through mergers, acquisitions, and IPO’s routinely use. This is one area where Hollywood has lagged behind. Celebrities … Continue reading

Posted in Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

The Threat of Apple Malware – Does Your Mac Need Protection?

For many years Apple users have not worried about malware to the extent Microsoft Windows users have.  Has the immunity to malware finally come to an end? Some might say yes, while others disagree. Apple computers no longer hold the … Continue reading

Posted in Hacking, Smart Phone Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

My 5 Tips for Passing the New ISC2 Electronic Based CISSP Exam

Did you know that ISC2 is planning a big change to the CISSP exam?  Anyone studying for or planning for the CISSP exam needs to be aware of the upcoming change. Starting September 1, 2012, ISC2 will offer the CISSP … Continue reading

Posted in Security Certification, Training and Education | Tagged , , , | Leave a comment

What Color is Your Cyber Hat?

People associate the term “hacker” with an individual who has malicious and/or criminal intent, has enough knowledge about computers to make them very dangerous, and are not to be trusted. Sometimes, they might be right. Sometimes, they couldn’t be farther from the truth. Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Security Certification, Training and Education, Uncategorized | Tagged , , , , | Leave a comment

Tips to Protect Your Customer’s Payment Information

Did you know that your unexpired credit card is worth as little as $0.06 and as much as $1000 on the black market? Cyber security experts explain that the “street value” of a stolen credit card number can vary widely depending on the status of the account, credit limit available, expiration date, and whether there is a physical-issued card to be sold as well. Continue reading

Posted in IT and Computer Security, Training and Education, Uncategorized | Tagged , , , , , , , , , , | Leave a comment

SSCP Certification to be Updated in 2012

The CISSP exam is not the only ISC2 exam due to be updated in 2012.  The SSCP certification will also undergo some changes.  Some topics have changed.  The 2012 SSCP 2012 domains are: Access Controls Security Operations and Administration Monitoring … Continue reading

Posted in Ethical Hacking, Training and Education | Tagged , , , , , , | Leave a comment

One Day CISSP Boot Camp/Seminar, Saturday, July 30, 2011

Are you looking for that extra edge to get ready for the CISSP exam?  Superior Solutions will be offering a one day CISSP exam prep class to help you prepare for the CISSP certification on Saturday, July 30th, 2011 from … Continue reading

Posted in Security Certification, Training and Education | Tagged , , | Leave a comment

CASP: CompTIA Advanced Security Practitioner – Beta Exam Results

CompTIA has wrapped up the beta exam for the Advanced Security Practitioner (CASP).  The beta was 92 questions and test candidates were given 135 minutes to complete it which works out to about 1 ½ minutes per question.  This may … Continue reading

Posted in IT and Computer Security, Security Certification, Training and Education | Tagged , , , , | Leave a comment

CASP Exam Tips

CompTIA has updated the requirements for the CASP exam. They have added some equipment and vendor specific products. The CASP exam is going to cover a lot of advanced security topics.  Exam candidates will need to have basic knowledge of … Continue reading

Posted in IT and Computer Security, Training and Education | Tagged , , , , , | Leave a comment

Are you Ready for Cloud Computing?

Cloud computing offers many benefits, but, it also changes the security equation. Historically, companies kept critical data behind firewalls.  Cloud computing is having a huge impact on the de-perimiterization of network boundaries.  It’s a game changer in that assets are … Continue reading

Posted in IT and Computer Security, Training and Education | Tagged , , , , | Leave a comment