RSA Conference College Day
I wanted to make sure that you were aware of an incredible opportunity for the current students and recent 2016 graduates of Las Posits...
Resume Advice for IT & Cybersecurity
One of the top requests I get is on how to write a great resume. How long should your resume be? What should You include? What should...
Dangers of IoT
The Oct. 21st 2016 DDoS attack on the domain name servers of DYN has been the recent topic of many articles lately. The attack left many...
5 Most Dangerous Hackers Of All Time
Here are 5 of the most dangerous hackers to ever walk the streets of the Internet. #Hack #Hacking #Cybersecurity #Vulnerability...
Have a Cyber Safe and Aware Holiday
Greetings - This time of year is sweet for hackers; IT folk are off, you’re on break and perfect targets for malware infestation and ID...
Securing Apple OS X 10.10 (NIST)
NIST is Proud to Announce the Release of Special Publication 800-179, Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A...
Hacking the Coffee Pot
The more and more items we add to the IoT (Internet of Things) the more and more security hacks you should expect to find. You have...
Hacking Car Computers
A new level of danger. In Vehicle Informant (IVI Computers) are being hacked with deadly results. “Two hackers have developed a tool...
Internal IT, The Risks
I found this story interesting because it was about an internal IT employee. For supporting the company employees, he was given the...
Cisco Security Webinars On-Demand
The Ransomware Threat: New Tactics and how to fight back The rise of ransomware has become one of the most widespread and financially...