Leetspeak: The History of Hacker Culture's Native Tongue

You've probably seen leetspeak, also known as 1337 or “l33t,” somewhere on the Internet or in a movie about computer hacking. It's essentially regular English, but with more hacker slang and with certain letters changed to numbers. In this blog, we cover the history of leetspeak and how it applies to you.

Top Penetration Testing Certifications

Penetration testing, also known as pen testing, is an ethical hacking tactic that helps companies protect themselves. Penetration testers try to break into clients' digital systems to find weaknesses before a black hat hacker does. This is a growing field as companies seek to prevent the high profile data breaches that have happened in recent years. The top penetration testing certifications can help you get into this field.

The History of Penetration Testing

Penetration testing has been around since human beings first began trying to understand their enemies' thought processes. Ancient armies all over the world conducted mock battles and games to figure out how other armies might undermine their strategies or get around their forces. This continued for centuries upon centuries until, inevitably, the tech world got in on the act.

Most Dangerous Hacked Medical Devices

Hacked medical devices could be the next big security nightmare. There are currently between 10 and 15 connected devices per hospital bed in the United States, many of which are vulnerable to attack.

How to Perform a Cybersecurity Risk Assessment: A Step-by-Step Guide

Organizational leaders must understand that comprehensive, risk-based decisions are vital to balancing the force multiplying effects of information systems with the risk of those systems being inherently vulnerable to exploitation. If you want to prevent or reduce the likelihood of an attack, you have to risk management strategy: how your organization will frame, assess, respond to and monitor risk over time.

PenTest+ vs CEH Certifications: What's the Difference?

When it comes to becoming an IT penetration testing professional, you have two main certifications to start your ethical hacking journey: the Certified Ethical Hacker (CEH) certification or the CompTIA PenTest+ certification. This article discusses the primary differences between the two.

Security+ Training and Certification: Its Value for Cybersecurity Professionals

A great way to get ahead in a cybersecurity career is to secure a credential. One of the most popular is the CompTIA Security+ certification. Don't be intimidated by the thought of the test! There are ways to prepare and it is actually a very approachable credential for a beginning professional. Here are the answers to a few FAQ's that candidates often have.

Top 10 Reasons Why CompTIA Security+ Training is Right for You

One of the most widely accepted and highly regarded accreditations is the CompTIA Security+ Certification. From financial benefits to career pathways to instant industry recognition, the CompTIA Security+ Certification is the smart choice for anyone who is serious about getting ahead. Here are ten reasons why the CompTIA+ Training is worth serious consideration.

DoD 8570: How the Military Handles Data and Why It Matters

Several years ago, the DoD passed a regulation, DoD 8570, which stated that all Information Assurance (IA) personnel were required by law to be compliant. Certification is necessary to work with this data, whether that be DoD staff, contractors, or partners.  

GDPR Overview and Compliance

GDPR will affect any business that has access to, or has the ability to process, personal data of any EU resident. In other words, if your business sells small kitchen tools online, and you sell to European customers, your data collection and privacy practices will be impacted by GDPR. This regulation will become mandatory for any company that deals in Europe, regardless if the business is located inside or outside the European Union. GDPR is slated to go into effect on May 25, 2018.

Web Application Penetration Testing: Why It’s Necessary and What You Need to Know

Web applications are the critical systems of many networks. They store, process, and transmit data. They are also vulnerable to hackers who can find vulnerabilities. So, the question becomes how secure is your network? And how comprehensively has it been tested?

Nobody Likes a Compliance Audit... and Why You Should Do Them Anyway!

Audits are necessary to determine whether or not an individual, company, or organization is meeting the requirements of a specific set of regulations or controls. Since certain regulations can impose steep financial penalties or other negative sanctions for non-compliance on both organizations and employees, it is extremely beneficial for organizations to routinely have compliance requirements verified and conduct audits to ensure continued compliance. 

Do College Degrees Matter in a Cybersecurity Career?

If you’re looking to break into the cybersecurity profession, you have two different potential career paths facing you. You can either enroll in a college degree program, or complete cybersecurity certifications. This article will walk you through both options so that you can determine which path is better suited to your career goals.

Famous Hackers and How They Got Caught

There are pioneers in every profession, and computer hacking is no exception. In fact, because literally, anybody with the right tech setup can launch their hacking career, the stories of famous hackers are often less glamorous than most people might expect.

5 Biggest Healthcare Cybersecurity Breaches

The number of healthcare cybersecurity breaches is on the rise with tens of millions affected in larger breaches, but hackers may target even regional insurers, smaller healthcare facilities, pharmacies, and individual physician’s offices. These breaches put medical facilities, insurers, and practitioners in the hot seat because they are liable for the security of the information they gather.