Cybersecurity Culture

Cybersecurity Paper Tigers are Killing Us

A paper tiger is a fake tiger, made of paper. It may appear to be a real tiger, but it has no substance, is unable to stand up to challenge, and can't perform any other tiger duties. Let's do the cybersecurity industry a favor and work to get rid of the paper tigers.

Leetspeak: The History of Hacker Culture's Native Tongue

You've probably seen leetspeak, also known as 1337 or “l33t,” somewhere on the Internet or in a movie about computer hacking. It's essentially regular English, but with more hacker slang and with certain letters changed to numbers. In this blog, we cover the history of leetspeak and how it applies to you.

How to Perform a Cybersecurity Risk Assessment: A Step-by-Step Guide

Organizational leaders must understand that comprehensive, risk-based decisions are vital to balancing the force multiplying effects of information systems with the risk of those systems being inherently vulnerable to exploitation. If you want to prevent or reduce the likelihood of an attack, you have to risk management strategy: how your organization will frame, assess, respond to and monitor risk over time.

Famous Hackers and How They Got Caught

There are pioneers in every profession, and computer hacking is no exception. In fact, because literally, anybody with the right tech setup can launch their hacking career, the stories of famous hackers are often less glamorous than most people might expect.

Cheating Cybersecurity Certification Exams

Cybersecurity certification exams are not easy to pass. According to Concise-courses.com, 70% of surveyed CISSP test-takers reported that the CISSP exam is "difficult." As such, some individuals seeking credentials in the field of cybersecurity have looked for ways to cheat their way into certification. 

Hacker Hat Colors: An Inside Look at the Hacking Ecosystem

In the world of hackers, there are both good and bad. There are also some that are somewhere in-between on the spectrum. When you look at the entire rainbow of hacker hat colors, you will find that there are many variations at work in the modern world of technology.   

10 Hacker Movies You Should Watch: What Hollywood Gets Right

In selecting the top 10 hacker movies for our list, we had some internal discussion (because as techies, we’re obviously the best ones to judge), and came up with these as the must-see films.

Do Script Kiddies Carry Out Most Cyber Attacks?

Over the decades, cybercrime has evolved, branching out into many strains. There are black hat hackers - (the criminally motivated). crackers, (those breaking into systems to steal information), hacktivists, (infiltrators of computer systems to use them as platforms for public movements), and script kiddies, defined by WiseGeek.com as "teenagers who use readily available tools written by experienced hackers to deface websites or break into computer systems, usually done for peer recognition and attention."