Tag / security

    Loading posts...
  • Cybersecurity Job Trends

    I was sent over this article published by uCertify. I recently did a review of one of their courses, which you can check out here. This article talks about the job trends in the cybersecurity world. Regardless of where you are, this is something to pay attention to. 68% of the organizations said that there is a global shortage of skilled professionals and 74% said that there is a lack…

  • uCertify-CS0-001-complete-Course-Review-cover

    uCertify CS0-001-complete Course Review

    I was approached by the marketing department of uCertify to review one of their exam preparation kits and write about it. I chose the CS0-001-complete course which covers the CompTIA CySA+ CS0-001 exam. It made sense to do this one as I’m studying for the Cysa+ certification. However, the courses are more expensive when compared to similar products. At the same time, the materials and content included is much more…

  • Vulnerability-Disclosure-Programs-cover-page

    Vulnerability Disclosure Programs

    This is a quick post on what a vulnerability disclosure program. I will explain it in more detail later on. A vulnerability disclosure program, also known as a bug bounty, is a program in which a company allows independent researchers to report vulnerabilities to the interested the company. To put it in other words. You own a company, a security researcher approaches you. He lets you know of a potentially…

  • content-filter-diagram

    Public Wifi and the online content filters

    Popular chains that offer free Wi-Fi to its patrons have begun implementing content filters. The popular coffee chain Starbucks being the most recent, deploying theirs in 2019. The sole reason for this? Porn. Prevalent usage of porn at all hours of the day, sometimes in broad daylight. This article is not to discuss why or when deployed. There are many articles that go in to further details about this. No,…

  • Google+ is getting shut down after data breach

    Google+ shutting down after users’ data is exposed To provide background for this story it is important to know what Google+ is. Google+ is Google’s answer to Facebook, it is their social media attempt. Launched in 2011, it has 516,246 according to a 2015 study by Eric Enge. Unfortunately, it never took off and the platform has been used by a small number of active users but did not meet the…

  • IBM QRadar Installation

    Installing Qradar is a straightforward process, but sometimes complications can arise. For instance, In the latest CentOS release, there seems to be a repository missing. This guide is best suited for those who have already installed CentOS7 and have the QRadar ISO file ready to go but have run into some issues. Scouring the internet and its various forums, I found a great guide that seemed to resolve my issues.…

  • The CIA Triad

    Confidentiality, Integrity, and Availability are three terms that form the foundation for a good security base. If these terms are maintained then your security posture will be adequate. In the field of information security, this is something we (companies and individuals) all strive to attain and keep. Confidentiality – The information is secure from outside forces or anyone who is not authorized to view. Example: your cat photos will be…