EC-Council’s Updated Certified Ethical Hacker v9 Training Focuses on Latest Cyber Attacks

With enterprise and governments struggling to keep up with the ever-changing cybersecurity landscape, EC-Council has updated its Certified Ethical Hacker (CEH) certification and training to version 9, focusing on the latest cyber attack vectors and addressing new vulnerabilities. With CEH training in preparation for the new CEH exam, students will gain access to thousands of the most commonly used hacking tools to help them look for vulnerabilities in their organization’s network just like a hacker would.

Read more

Following Security Best Practices is Good But May Not Be Enough

If you look at books and publications on cybersecurity, it’s clear that we continue to emphasize common information security best practices: Keep up with patches, disable unnecessary services, have users work with limited privilege, follow system hardening principles, and maintain an ongoing program of user education. Depending on the industry, there are guidelines, standards, or even federal regulations that drive cybersecurity. Unfortunately, as shown by Heartland Payment Systems and Target Stores, these standards are often viewed as encompassing security solutions, rather than baseline, minimal requirements.

Read more

Testing Your Skills at Hacker Challenge Sites

Hackers taking down websites and company networks has been a recurring topic in the news over the last few years. Many of these system breaches seem simple or easy in retrospect. But what is often overlooked is the amount of time and effort the hackers invested in learning their skills and working on a particular target.

Read more

Testing Your Skills at Hacker Challenge Sites

Hackers taking down websites and company networks has been a recurring topic in the news over the last few years. Many of these system breaches seem simple or easy in retrospect. But what is often overlooked is the amount of time and effort the hackers invested in learning their skills and working on a particular target.

Read more

Who’s the Hacker?

Before the era of cybercrime, hacking for social, political, or religious causes (so-called hacktivism), and terrorist threats to our infrastructure and monetary systems, the hacker started as an explorer and traveler on the data superhighway. Today, we can still categorize some hackers as explorers. In fact, the title “hacker” carried the pejorative meaning only recently.

Read more