• Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
  • Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact

Posts by Hilary Meyers

About Hilary Meyers

This author hasn't written their bio yet.
Hilary Meyers has contributed 110 entries to our website, so far.

How to Get into Cybersecurity

How to Get into Cybersecurity

In our increasingly digital world, cybersecurity is becoming more and more important. If you are considering trying to break into this field of work, then read our handy guide on how to get into cyber security.

Security+ Training and Certification: Its Value for Cybersecurity Professionals

Security+ Training and Certification: Its Value for Cybersecurity Professionals

A great way to get ahead in a cybersecurity career is to secure a credential. One of the most popular is the CompTIA Security+ certification. Don’t be intimidated by the thought of the test! There are ways to prepare and it is actually a very approachable credential for a beginning professional. Here are the answers to a few FAQ’s that candidates often have.

Top 10 Reasons Why CompTIA Security+ Training is Right for You

Top 10 Reasons Why CompTIA Security+ Training is Right for You

One of the most widely accepted and highly regarded accreditations is the CompTIA Security+ Certification. From financial benefits to career pathways to instant industry recognition, the CompTIA Security+ Certification is the smart choice for anyone who is serious about getting ahead. Here are ten reasons why the CompTIA+ Training is worth serious consideration.

DoD 8570: How the Military Handles Data and Why It Matters

DoD 8570: How the Military Handles Data and Why It Matters

Several years ago, the DoD passed a regulation, DoD 8570, which stated that all Information Assurance (IA) personnel were required by law to be compliant. Certification is necessary to work with this data, whether that be DoD staff, contractors, or partners.  

GDPR Overview and Compliance

GDPR Overview and Compliance

GDPR will affect any business that has access to, or has the ability to process, personal data of any EU resident. In other words, if your business sells small kitchen tools online, and you sell to European customers, your data collection and privacy practices will be impacted by GDPR. This regulation will become mandatory for any company that deals in Europe, regardless if the business is located inside or outside the European Union. GDPR is slated to go into effect on May 25, 2018.

Web Application Penetration Testing: Why It’s Necessary and What You Need to Know

Web Application Penetration Testing: Why It’s Necessary and What You Need to Know

Web applications are the critical systems of many networks. They store, process, and transmit data. They are also vulnerable to hackers who can find vulnerabilities. So, the question becomes how secure is your network? And how comprehensively has it been tested?

Nobody Likes a Compliance Audit… and Why You Should Do Them Anyway!

Nobody Likes a Compliance Audit… and Why You Should Do Them Anyway!

Audits are necessary to determine whether or not an individual, company, or organization is meeting the requirements of a specific set of regulations or controls. Since certain regulations can impose steep financial penalties or other negative sanctions for non-compliance on both organizations and employees, it is extremely beneficial for organizations to routinely have compliance requirements verified and conduct audits to ensure continued compliance. 

Do College Degrees Matter in a Cybersecurity Career?

Do College Degrees Matter in a Cybersecurity Career?

If you’re looking to break into the cybersecurity profession, you have two different potential career paths facing you. You can either enroll in a college degree program, or complete cybersecurity certifications. This article will walk you through both options so that you can determine which path is better suited to your career goals.

5 Biggest Healthcare Data Breaches

5 Biggest Healthcare Data Breaches

The number of healthcare cybersecurity breaches is on the rise with tens of millions affected in larger breaches, but hackers may target even regional insurers, smaller healthcare facilities, pharmacies, and individual physician’s offices. These breaches put medical facilities, insurers, and practitioners in the hot seat because they are liable for the security of the information they gather. 

Hacker Hat Colors: An Inside Look at the Hacking Ecosystem

Hacker Hat Colors: An Inside Look at the Hacking Ecosystem

In the world of hackers, there are both good and bad. There are also some that are somewhere in-between on the spectrum. When you look at the entire rainbow of hacker hat colors, you will find that there are many variations at work in the modern world of technology.   

10 Hacker Movies You Should Watch: What Hollywood Gets Right

10 Hacker Movies You Should Watch: What Hollywood Gets Right

In selecting the top 10 hacker movies for our list, we had some internal discussion (because as techies, we’re obviously the best ones to judge), and came up with these as the must-see films.

History of Cybersecurity Certifications

History of Cybersecurity Certifications

Cybersecurity is one of the fastest growing career fields in the world. Job seekers, career switchers, and hiring managers alike need a fast but rigorous way to qualify candidates for jobs. Certifications prepare cybersecurity specialists for jobs and help companies determine which candidates are best qualified for their open positions.

Byobu – Keep Your Terminal Sessions Running in the Background

Byobu – Keep Your Terminal Sessions Running in the Background

Byobu is a wonderful tool that allows multiple sessions running in the background, even when the SSH session that launched them dies.

Exciting Updates Between CEH v9 and CEH v10

Exciting Updates Between CEH v9 and CEH v10

EC-Council has recently announced major revisions to several of their training certification programs. What are the differences between CEH v9 and CEH v10?

Do Script Kiddies Carry Out Most Cyber Attacks?

Do Script Kiddies Carry Out Most Cyber Attacks?

Over the decades, cybercrime has evolved, branching out into many strains. There are black hat hackers – (the criminally motivated). crackers, (those breaking into systems to steal information), hacktivists, (infiltrators of computer systems to use them as platforms for public movements), and script kiddies, defined by WiseGeek.com as “teenagers who use readily available tools written by experienced hackers to deface websites or break into computer systems, usually done for peer recognition and attention.”

7 Common Cybersecurity Portmanteaus: Their Meanings Explained

7 Common Cybersecurity Portmanteaus: Their Meanings Explained

The cybersecurity world is replete with creative portmanteaus, so it pays to at least familiarize yourself with the most common ones you might encounter. 

7 Top Certifications for Cybersecurity Professionals

7 Top Certifications for Cybersecurity Professionals

To be best prepared to enter or promote your role in the cybersecurity job market, it’s a good idea to explore the certifications available, including the top seven which will prepare you for specific roles, including: CISSP, CompTIA Security+, CAP, CEH, CHFI, CISM, and CASP.

What is the Origin of the Word “Cyber”?

What is the Origin of the Word “Cyber”?

Many assume that “cyber” is a portmanteau derived from other words, but it’s not. Here’s a look at where the word cyber came from, the evolution of its usage, and a glimpse at the debate among the technical community on what it means and how to phrase it. 

Spot and Stop Phishing Emails

Spot and Stop Phishing Emails

Email is such a seamless part of everyday life that it is easy to take for granted just how vulnerable anyone can be to a well-crafted effort to steal your identity or confidential financial information. One of the most effective methods used by hackers is phishing, which entails trying to trick you into clicking on a link or attachment in an email.

Top 5 Cybersecurity Breaches of All Time

Top 5 Cybersecurity Breaches of All Time

We look at five of the worst cybersecurity breaches of all time. There are many ways to rank the largest cybersecurity breaches. We chose to highlight those that affected the most records, triggered the highest dollar impact, was repeated, was an inside job, and the most egregious. 

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

BLOG SEARCH:

Connect with Us

Interested in our cybersecurity training or services? Complete the form below and we’ll get back with you right away. We appreciate your interest.


Recent Posts

  • The State of Ransomware 2020
  • National Cybersecurity Awareness Month: 6 Things to Practice During the Month
  • Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
  • What Is DevSecOps?
  • Cybersecurity and a Remote Workforce: What Does the Future Look Like?
  • 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
  • Incorporating Privacy and Security by Design into MedTech
  • What is the Difference Between CMMC, DFARS, and NIST 800-171?
  • At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
  • 5 Reasons to Hire a Fractional CISO
  • Why Private Cybersecurity Training Matters for Your Organization
  • Is the CEH Certification Right For You?
  • Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
  • Best Beginner Cybersecurity Certification to Get
  • Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Alpine Security is a member of the CISO Global family of companies.

Contact Us:

  • CISO Global
  • 6900 E. Camelback Road, Suite 900 Scottsdale, AZ 85251
  • 480-389-3444
  • info@ciso.inc
  • www.ciso.inc

Get Info

About Our Training
About Our Services
Meet the Team
Blog
Terms of Use
Privacy Policy

Join The Community

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Mail

Proud Partners

© 2021 · Alpine Security, a Cerberus Sentinel Company