Resume Advice for IT & Cybersecurity
One of the top requests I get is on how to write a great resume. How long should your resume be? What should You include? What should...
Dangers of IoT
The Oct. 21st 2016 DDoS attack on the domain name servers of DYN has been the recent topic of many articles lately. The attack left many...
5 Most Dangerous Hackers Of All Time
Here are 5 of the most dangerous hackers to ever walk the streets of the Internet. #Hack #Hacking #Cybersecurity #Vulnerability...
Resume Tips from David Hay
Resume Tips 2016 (Updated) - Your resume sucks now let me show you how to fix it #Career #Resume
Have a Cyber Safe and Aware Holiday
Greetings - This time of year is sweet for hackers; IT folk are off, you’re on break and perfect targets for malware infestation and ID...
Book Review: Ready Player One
Ernest Cline’s “Ready Player One” is a book filled with references to video games, virtual reality, ’80s pop-culture trivia, geek heroes...
Securing Apple OS X 10.10 (NIST)
NIST is Proud to Announce the Release of Special Publication 800-179, Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A...
Hacking the Coffee Pot
The more and more items we add to the IoT (Internet of Things) the more and more security hacks you should expect to find. You have...
Hacking Car Computers
A new level of danger. In Vehicle Informant (IVI Computers) are being hacked with deadly results. “Two hackers have developed a tool...
Internal IT, The Risks
I found this story interesting because it was about an internal IT employee. For supporting the company employees, he was given the...