Hacked? How to Break the Bad News to the C-Suite

Sure, your organization needs defensive strategies that go beyond basic compliance and are both durable and flexible. It’s a generally accepted fact that the human element is a critical facet of cybersecurity in terms of maintaining an educated workforce. But what happens when the inevitable breach happens, and you’re responsible for sharing the bad news?

Read more

The Evolution of Cloud Job Roles and Training

As with all technologies transforming the way organizations operate, it’s expected that roles will also evolve. Cloud computing already has and will continue to change traditional IT roles and functions for years to come. We’ll begin our overview of the transformation of cloud job roles with a look at some of the top cloud computing roles and responsibilities for architects, engineers and developers.

Read more

Reducing the Security Risks Associated with BYOD

BYOD initially started as a trend by employees due to the fact that they are more familiar with their own devices and applications; what’s more, most organizations are behind on technology due to lack of funding or resources. Employees found that the same work could potentially be completed faster and more efficiently by using personal devices instead of the outdated and severely weathered equipment issued by their employer. However, this is more than merely using their own devices; it’s about ease of access and having the ability to work from any location – not just from the office.

Read more

Reducing the Security Risks Associated with BYOD

Bring Your Own Device (BYOD) initially started as a trend by employees due to the fact that they are more familiar with their own devices and applications; what’s more, most organizations are behind on technology due to lack of funding or resources. Employees found that the same work could potentially be completed faster and more efficiently by using personal devices instead of the outdated and severely weathered equipment issued by their employer. However, this is more than merely using their own devices; it’s about ease of access and having the ability to work from any location—not just from the office.

Read more

CEH v9 Question of the Week: Password Attack Method

Kelly is a network security officer for a large state-run agency in California. Kelly is asked by the IT manager of another state agency to perform a security audit on their network. This audit she is asked to perform is an external audit. The IT manager thought that Kelly would be a great candidate for this task since she does not work for this other agency and is an accomplished IT auditor. The first task that she is asked to perform is an attempt to crack user passwords. Since Kelly knows that all state agency passwords must abide by the same password policy, she believes she can finish this particular task quickly. What is the best password attack method for Kelly to use in this situation?

Read more