• Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
  • Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact

Posts by Hilary Meyers

About Hilary Meyers

This author hasn't written their bio yet.
Hilary Meyers has contributed 110 entries to our website, so far.

Why Skipping a Cybersecurity Degree is Good for Your Career and Pocket Book

Why Skipping a Cybersecurity Degree is Good for Your Career and Pocket Book

If you are clear on a career in cybersecurity, spending 4 years on a bachelor’s degree is more than likely a waste of your time and money. You can learn everything for free on the Internet. And, are “core” courses really going to help you? Political science, art appreciation, history?

Cybersecurity Common Sense is Not Always Common Practice

Cybersecurity Common Sense is Not Always Common Practice

Common sense is not always common practice, especially with cybersecurity. Most of the breaches we see today are not because some super cool artificial intelligence firewall failed.

Life of a CISSP “In Progress”

Life of a CISSP “In Progress”

Life of a CISSP “In Progress”. What’s it like to be in the pursuit of a CISSP while balancing daily life commitments.

9 Practical Tips to Triumph Over the CISSP Exam

9 Practical Tips to Triumph Over the CISSP Exam

Follow these 9 tips and your chances of passing the CISSP Exam will greatly increase.

9 Keys to Choosing the Best CISSP Training

9 Keys to Choosing the Best CISSP Training

You’re here most likely because you need or want to pass the CISSP certification exam. How do you decide which CISSP training will best enable you to pass the CISSP certification exam? This guide covers 9 points to consider before selecting a CISSP training provider.

CISSP Pass Rates: What You Don’t Know

CISSP Pass Rates: What You Don’t Know

Many CISSP training providers advertise high pass rates, such as we have a “99.9% CISSP Certification Exam” pass rate. This may entice you to consider that CISSP training provider, but their pass rate is really just an estimate.

Pass the CISSP Certification Exam without Trying at All – 100% Guaranteed [Not Really]

Pass the CISSP Certification Exam without Trying at All – 100% Guaranteed [Not Really]

Let’s cut to the chase:

There is no way to guarantee you will pass the CISSP Certification Exam!

That’s the bottom-line.

CISM vs CISSP: How to Decide Which is Best for You

CISM vs CISSP: How to Decide Which is Best for You

We get asked all the time – should I get a CISM, CISSP, or both?

The short answer is you should get the CISSP certification.

The long answer is that it really depends on your goals and what you are trying to accomplish.

CISSP Boot Camps: 5 Things You Should Know

CISSP Boot Camps: 5 Things You Should Know

CISSP “boot camp” is just a fancy term for CISSP “training”. Many CISSP training providers use the terms interchangeably. A CISSP “boot camp” has a few distinctions though. Before we dive into these distinctions, let’s take a step back. The term “boot camp” means a “short, intensive, and rigorous course of training”. This definition holds true with CISSP boot camps. This post discusses the 5 things you should know about CISSP Boot camps.

5 Costly Misconceptions About CISSP Training

5 Costly Misconceptions About CISSP Training

Choosing a training provider for CISSP certification training is a tough decision. Our aim is to inform you on some of the common misconceptions about CISSP training, so you are empowered to make better choices.

digitalworld.local: BRAVERY Walkthrough

digitalworld.local: BRAVERY Walkthrough

This blog is a walkthrough of digitalworld.local: BRAVERY. The VM was created by Donavan and you can download it from VulnHub. According to the author, it was originally designed for OSCP (Offensive Security Certified Professional) practice.

Linux: You’ve Come a Long Way, Baby!

Linux: You’ve Come a Long Way, Baby!

Alpine Security CTO, “Doc” Sewell, describes his obsession with computers, programming, and cybersecurity from elementary school until now.

Malware Research Explained, Part 1

Malware Research Explained, Part 1

Many organizations hear the term “malware” and immediately screech in fear. If you are interested in malware research, as long as you are using safe practices, there is not a lot to be afraid of. For those of you who are interested in malware research and figuring out how and why these pieces of malicious software do what they do, this article might be for you.

Securing Home WiFi Networks

Securing Home WiFi Networks

When consumer WiFi was first introduced, it was all about keeping our neighbors from stealing our internet connection over our WiFi networks. Now, with the explosion of mobile devices, Internet of Things devices, and other “smart” devices connecting to our home WiFi there is a big chance of intruders being able to steal very sensitive information from us.

Surviving a Ransomware Attack in Healthcare

Surviving a Ransomware Attack in Healthcare

The rising instances of ransomware attacks is harrowing to say the least. Attackers seek to achieve quick financial gains through the use of this tactic and to be frank, it is working. This blog provides some solutions to help you avoid becoming the next ransomware victim.

CIS Control 2:  Are You Running Software Unaware?

CIS Control 2: Are You Running Software Unaware?

CIS control 2 speaks to basic cybersecurity hygiene, only it is software and applications specific. Often, attackers will look for unpatched or unsupported software to target, regardless of the system it is running on, or the type of business using it.

Vulnerability Assessment With Nessus Home – Part 1

Vulnerability Assessment With Nessus Home – Part 1

If you work in the field of Information Technology, you have probably heard of Vulnerability Assessment (VA). VA is a process of identifying security vulnerabilities in a system. It is recommended that you conduct a VA against your organization’s network every quarter, and if your organization follows certain policy and standards, such as PCI DSS, VA is a requirement. However, organizations should not be the only ones conducting VAs against their network; average home users should also conduct vulnerability assessment against their network. In this blog, I will guide you through the process of performing a VA against your network using Nessus Home.

Mr. Robot Walkthrough (Vulnhub)

Mr. Robot Walkthrough (Vulnhub)

Anyone who is inspired to partake in a challenging course such as the Offensive Security Certified Professional (OSCP), or Licensed Penetration Tester-Master (LPT (Master)), knows that practice makes you a better hacker. Vulnhub is a great resource to find purpose-built virtual machine images to practice on. This image is based on a popular TV show, and we are going to walk through exploiting it together.

Incident Response Plan: The Tool You Hope You Never Need

Incident Response Plan: The Tool You Hope You Never Need

It’s no question that in cybersecurity, defense is the best defense. In the constantly changing threat landscape, the tie often goes to the attacker, and businesses are forced to act like turtles putting up shells of security to ward off threats. 

General Data Protection Regulation (GDPR) Overview

General Data Protection Regulation (GDPR) Overview

The new European Union (EU) Regulation 2016/679 GDPR (General Data Protection Regulation) have gone into effect May 25, 2018. This will have a far-reaching effect and identify many possible repercussions for any organization collecting, processing, and/or storing any EU citizen’s information.  Your company need not be located in any of the EU countries; rather if your company collects any EU citizen’s information, your company must adhere to and be complaint to the new regulation. 

  • 1
  • 2
  • 3
  • …
  • 5
  • 6

BLOG SEARCH:

Connect with Us

Interested in our cybersecurity training or services? Complete the form below and we’ll get back with you right away. We appreciate your interest.


Recent Posts

  • The State of Ransomware 2020
  • National Cybersecurity Awareness Month: 6 Things to Practice During the Month
  • Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
  • What Is DevSecOps?
  • Cybersecurity and a Remote Workforce: What Does the Future Look Like?
  • 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
  • Incorporating Privacy and Security by Design into MedTech
  • What is the Difference Between CMMC, DFARS, and NIST 800-171?
  • At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
  • 5 Reasons to Hire a Fractional CISO
  • Why Private Cybersecurity Training Matters for Your Organization
  • Is the CEH Certification Right For You?
  • Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
  • Best Beginner Cybersecurity Certification to Get
  • Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Alpine Security is a member of the CISO Global family of companies.

Contact Us:

  • CISO Global
  • 6900 E. Camelback Road, Suite 900 Scottsdale, AZ 85251
  • 480-389-3444
  • info@ciso.inc
  • www.ciso.inc

Get Info

About Our Training
About Our Services
Meet the Team
Blog
Terms of Use
Privacy Policy

Join The Community

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Mail

Proud Partners

© 2021 · Alpine Security, a Cerberus Sentinel Company