RSS
-
Recent Posts
Recent Comments
Archives
- June 2017
- February 2017
- September 2016
- August 2016
- June 2016
- January 2016
- April 2015
- January 2015
- February 2014
- January 2014
- October 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- May 2010
- April 2010
Categories
Meta
Tag Archives: Assessment
The US / Russian Simmering Cyberwar
Russia’s cyber assault on the US election is one of the most provocative acts we have seen against the US from a cyber prospective. It should be clear that cyberwar is an effective tool for Russia’s military and political goals. … Continue reading
Is Windows 10 Spying On You or Simply Building a Better User Experience?
Microsoft has come under fire from privacy advocates because many end-users feel that Window 10 is way too intrusive. While it is true that much of this data is used to enhance user experience, Microsoft’s lack of transparency isn’t doing … Continue reading
Posted in Hacking, IT and Computer Security, rogueware
Tagged Assessment, CISSP, Cyber Crime, Cyber Security, network security, Security Assessment, sniffing, threat, Training
Leave a comment
Why Ethical Hackers Are In Strong Demand
Ethical hackers are in strong demand because modern cyber attacks can be highly focused, targeting your online assets and intellectual property. Especially in this BYOD (bring your own device) era, security breaches must be avoided. It’s like a hole in … Continue reading
Posted in Cyber security, Ethical Hacking, Hacking, Training and Education
Tagged Assessment, Cyber Crime, Cyber Security, Hackers, Hacking, Security Assessment, threat
Leave a comment
The Prevalence of Cyber Crime
While many people acknowledge the prevalence of hacking and cyber crime, many, including businesses, do not take the necessary steps to ensure their cyber security. Even though there have been so many big cyber hacking cases exposed such as Target, … Continue reading
Posted in Cyber security, Ethical Hacking, Hacking
Tagged Assessment, Cyber Crime, Cyber Security, Hackers, Hacking, Security Assessment
Leave a comment
Credit Card Hacking: 10 Things You Should Know About Smart Cards
The United States likes to think of itself as a technology leader yet has not adopted smarts cards as a replacement for magnetic strip credit cards. Smart cards are easy to identify because of the small electronic chip found on … Continue reading
Everyone Needs to be Responsible for Cyber Security
The threat of cyberspace attacks are a significant concern for businesses and individuals. The Internet is a great resource for finding information and to make a purchase. However, the use of personal data when online is a valid concern for … Continue reading
Ramping up cyber security means shutting down Botnets
It’s no wonder today’s cyber criminals can continue to gorge themselves on our vulnerable networks: It’s just plain easy, according to a post by Brian Prince, “Cybercrime Inc.: The Business of the Digital Black Market.” For example, cyber criminals can … Continue reading
Posted in Cyber security, Ethical Hacking, Hacking, Training and Education
Tagged Assessment, attack, Hackers, Hacking, identity theft, malware, Security Assessment, threat
Leave a comment
Businesses Must Be Proactive With Cyber Security Policies
Security breaches and intrusions have been in the spotlight as businesses across several sectors have reported damaging intrusions into their networks. Many of these have resulted in the theft of consumer personal data, or even worse, sensitive government information. Unfortunately, … Continue reading
Posted in Cyber security, Ethical Hacking, Training and Education
Tagged Assessment, Policies, Security Assessment, Training
Leave a comment
Hackers feed on the lack of penetration testing and security audits
Network and software security? Hacker’s feed on the lack of it. They live for the challenge of finding vulnerabilities, and they know when and how to accomplish their cyber intrusions just when you think your audits are trustworthy. The legacy … Continue reading
Posted in Ethical Hacking
Tagged Assessment, Hackers, Hacking, online-security, Security Assessment
Leave a comment
Identify IT Vulnerabilities with a Security Assessment
The IT infrastructure for a business may have hidden vulnerabilities that can expose data to many types of risks. One way to identify vulnerabilities on a system is to perform a security assessment. A strategic company that can perform ethical … Continue reading