What’s the Difference Between BEC and Regular Phishing? The other day I was asked to partake in a “working group” about business email compromises also…
Cyber Stress: Fact or Fiction?
As an American who has traveled all over the world and has experienced the life of other cultures, I know we live in one of…
A Must-Read for Anyone New or Seeking a Career in Cybersecurity
Has anyone ever heard of an entry-level cybersecurity position? The answer is NO because these positions are golden unicorns – they don’t exist. Any position…
Big Data: What is it and How is it Protected?
Big Data is defined as a large amount of data that is unmanageable using internet-based platforms or traditional software. The Medical industry can be considered…
The Future: 5G
As the world progresses, it is only right that the network which connects us all does as well. The long-awaited fifth-generation mobile network has revolutionized…
Cyber Access Control & DDoS Attacks
Access control is a security process that regulates a user’s ability to connect to different systems or networks. While our accessibility is increased through cyber…
COVID-19 Impacts on Cybersecurity Conferences
To be frank, 2020 has become a train-wreck. Nobody could have predicted that 2020 would turn out the way it has, the least of them…