HackDig : Dig high-quality web security articles

Building a More Secure Cloud: 5 Strategies for 2022

Cloud adoption continues to soar. More than two-thirds of small to mid-sized businesses intend to increase their use of cloud technologies over the next few years. While the cloud comes with many security benefits, it also carries unique concerns.As the cloud becomes increasingly central to business operations, cloud security should be a priority. Businesses
Publish At:2022-06-01 02:13 | Read:378 | Comments:0 | Tags:Cloud Featured Articles Automation cloud security cloud stra

Work From Home Productivity Tips

For many of us, working from home is here to stay, but it does come with its own challenges. This article contains some of the best tips and tricks from TrustedSec consultants on how to stay focused at home. Set an alarm to start and stop working Alarms can be set in shorter intervals, to enforce short breaks and portion up the day. Remind yourself
Publish At:2022-02-15 15:54 | Read:1378 | Comments:0 | Tags:Career Development Organizational Training Training

Cybersecurity: When Stress and Trauma ‘Get in the Way’

This blog contains a discussion about stress, trauma, and domestic violence. This may be difficult for some readers, and given the alarming figures around Post-Traumatic Stress Disorder (PTSD), trauma, and early life experiences (ACEs), this will likely concern at least a small population of readers.Please take care of yourself when reading this and break of
Publish At:2021-12-28 02:05 | Read:2264 | Comments:0 | Tags:Featured Articles awareness cybersecurity training security

CISO Interview Series: What Are Some of the Key Components to Succeeding as a CISO in Today’s Business Environment?

The role of the modern CISO is more than understanding the technical side of the business. In fact, the role consists of even more than understanding the business side of the business. When I spoke with Ian Thornton-Trump, he was able to shed light on how important effective communication and team-building are to the overall success of a modern CISO. Hi
Publish At:2021-12-20 02:05 | Read:1596 | Comments:0 | Tags:Featured Articles CISO cybersecurity awareness cybersecurity

A Career in IT: Where Do I Start?

It is, by far, the most frequent question I get asked: How do I get started in IT/InfoSec? So many seem interested in the field of computers, system administration, networking, or information security but have no idea where to start, which can be a frustrating place to be. This blog post is for all of you (and, selfishly, an easy link for me to hand out next
Publish At:2021-05-25 11:30 | Read:1234 | Comments:0 | Tags:Career Development Training

Cybersecurity Training: Raising Awareness And Securing Your Business

Organizations are increasingly faced with threats from sophisticated criminal organizations and nation-state actors.  To mitigate the risks posed by cyber criminals, organizations must secure and protect their proprietary and sensitive information. They must also commit to training their employees to do their part to protect proprietary and sensiti
Publish At:2021-05-18 00:17 | Read:2599 | Comments:0 | Tags:Featured Articles cyber security culture cybersecurity cyber

Next OSSEC Training Scheduled @ 44Con

If you follow me, you probably already know that I’m a big fan of OSSEC. I would like to thank 44Con for accepting my next training! If you are interested in learning cool stuff about OSSEC and how to integrate it with third-party tools/sources, this one is for you! OSSEC is sometimes described as a low-cost log management solution but it has many interes
Publish At:2021-03-02 05:31 | Read:2011 | Comments:0 | Tags:OSSEC Training Conference Event

Smell the Attack? Sensory-Immersive Cyber Range Training for Industry 4.0

Humanity has been through a number of industrial revolutions since the 1760s, and is now at its fourth cycle of sweeping industrial innovation, known as Industry 4.0. It is characterized by the ongoing automation of traditional manufacturing and industrial practices using modern smart technology. As such, it inherits risks and threats that apply to connect
Publish At:2021-02-10 11:35 | Read:1630 | Comments:0 | Tags:Incident Response Security Services Advanced Persistent Thre

Five Things Security and Development Teams Should Focus on in 2021

As we say goodbye to 2020 and spend time reflecting on the industry changes, reassess our workflows and procedures in order to identify where 2021 will bring us, it’s a brilliant time to also address our security practices and ways we can bring improvement to those, as well.After considering the top challenges I saw with development teams and security teams
Publish At:2021-01-21 00:02 | Read:2061 | Comments:0 | Tags:Cyber Security Documentation Security by Design training sec

More Lessons Learned About Trying Harder and Passing the Offensive Security Certified Professional Exam (OSCP)

On February 11, 2020, Offensive Security introduced a major overhaul and update to their already fantastic course: Penetration Testing with Kali Linux. Those changes included updates to their lab environment.The study materials were substantially updated, with additional material including entire new sections on Bash Scripting, Active Directory Attacks, and
Publish At:2021-01-13 00:56 | Read:2158 | Comments:0 | Tags:IT Security and Data Protection OSCP training security

Phishing tricks that really work – and how to avoid them

Co-authored byJuan Badell and Russell PetrichAs two people for whom creating phishing emails constitutes legitimate employment (we are on the product team behind the Sophos Phish Threat phishing simulation service) we know we’re in the minority.Like our not-so-lawful counterparts, we spend our days using social engineering techniques to trick people into ope
Publish At:2020-12-15 11:37 | Read:2070 | Comments:0 | Tags:BEC Phishing education Phish Threat phishing training

Lessons from Teaching Cybersecurity: Week 6

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python ai
Publish At:2020-11-09 12:37 | Read:2113 | Comments:0 | Tags:Cyber Security teaching toolkit tools training security cybe

Lessons From Teaching Cybersecurity: Week 2

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python cla
Publish At:2020-10-07 01:37 | Read:2399 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Intern Men

Helping Inspire the Next Generation of Cybersecurity Professionals

If you had asked 10 year old Tyler what he wanted to be when he grew up, the answer would have been a very enthusiastic, “Teacher!”Over time, however, that desire lessened as my fascination with technology grew. I ultimately ended up attending Fanshawe College to study Computer Systems Technology. I never fully abandoned that desire to teach, though. For a p
Publish At:2020-09-30 12:20 | Read:1915 | Comments:0 | Tags:Cyber Security Education training security cyber cybersecuri

Lessons From Teaching Cybersecurity: Week 1

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python cou
Publish At:2020-09-30 12:20 | Read:1713 | Comments:0 | Tags:IT Security and Data Protection lessons school teaching trai

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3