SSH, Telnet, Exfiltration, and Whoami? For many cybersecurity professionals, simply compromising a network may only be the first step in an attack. It may require a great technical effort to gain undetected access to a network, but entrenchment involves gaining an advantageous position after gaining network access.
Read more →It is not always an easy task determining which approach and what amount of resources are necessary to secure networks from cyber attacks. Protecting important information is essential when resources are at risk, but there are wasteful approaches and limited resources available to secure information. Depending on
Read more →Secure Your Small Business With Affordable and Practical Cyber Security Training “Cyber security education and training should be free for everyone, especially for small businesses,” suggested the witnesses who testified before the Senate small business committee. With data breach incidents at large companies such as Home Depot,
Read more →Cyber Security Strategies to be Social and Secure During his testimony before the Senate Committee, Facebook CEO Mark Zuckerberg faced many tough questions, one particularly difficult question, “Who owns the virtual you?” made not just the CEO, but also those active on social media, nervous. Facebook users
Read more →