• Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
CISO Global (formerly Alpine Security)CISO Global (formerly Alpine Security)
  • Training
    • Overview
    • Schedule
    • Catalog
    • Training Reviews
    • Delivery Options
    • About Our Training
    • Exam Pass Guarantee
    • Student Funding
    • Alpine Security GSA Schedule
    • DoD 8570/8140 Approved Training
  • Services
    • Overview
    • Medical Device Cybersecurity
    • CISO-as-a-Service
    • Penetration Testing
    • DFARS and CMMC Compliance Audit
    • Breach Prevention Audit
    • Cybersecurity Risk Management Program
    • Enterprise Security Audit
    • Alpine Services Reviews
  • Blog
  • News
  • About Us
    • About Us
    • Meet The Team
    • Why Alpine?
  • Contact

Posts by Hilary Meyers

About Hilary Meyers

This author hasn't written their bio yet.
Hilary Meyers has contributed 110 entries to our website, so far.

7 Hardest Cybersecurity Certifications

7 Hardest Cybersecurity Certifications

Certifications can be the most cost-effective way to boost your credentials no matter where you are in your career. Some cybersecurity certifications are fairly straightforward, but others can provide you with a real challenge.We ranked the seven hardest cybersecurity certifications based on required experience, exam duration, exam requirements, and prerequisites needed to earn the certificate as well as the pay it can offer.

Who Needs Pen Testing? 3 Industries that Rely on It

Who Needs Pen Testing? 3 Industries that Rely on It

Penetration testing – sometimes called white-hat hacking – is how companies manage risk, increase business continuity, and protect clients from data breaches. In highly regulated industries such as healthcare, banking, and service industries, it also helps companies stay compliant. SOC 2, HIPAA, and PCI DSS are three of the main regulations that require penetration testing.

7 Hottest Cybersecurity Jobs for 2018

7 Hottest Cybersecurity Jobs for 2018

Cybersecurity is one of the fastest growing career fields in the United States (and really, around the world). If you’re looking at making it your career, you need to know what cybersecurity jobs are the hottest up-and-comers in 2018.We created a point system in which we assigned value to each job based on pay, growth rate, career options, coolness factor, and experience required. Here are our topic picks.

Two Keys to Stopping Cyber Attacks 

Two Keys to Stopping Cyber Attacks 

Protecting your agency or company from cyber crime is critical to keeping your business running smoothly and profitably in the digital age.

What are two of the most likely areas of vulnerability in your cyber defense strategy

How to Start a Career in Cybersecurity: A Concise Guide

How to Start a Career in Cybersecurity: A Concise Guide

One of today’s most in-demand and lucrative fields, cybersecurity (or infosec, as it’s sometimes called) can let you protect key data, undermine international espionage, catch cyber criminals, and stay on the front lines of technology. Plus, you can earn a top-performer’s salary and enjoy a range of interesting career opportunities. Let’s take a look at what cybersecurity is, the state of the infosec job market, cybersecurity across industries, careers in the field, and educational opportunities to help you get started.

Black Hat vs White Hat Hackers

Black Hat vs White Hat Hackers

Black hats vs white hats may sound like a spaghetti Western or a Parisian fashion show, but actually they make a clever way to distinguish between criminals who bypass computer systems for nefarious purposes and computer specialists who try to stop them.

Do Employers Value Cybersecurity Certifications?

Do Employers Value Cybersecurity Certifications?

Are you looking for a career on the front lines of national defense or at the cutting edge of corporate security? 

Information security, sometimes called cybersecurity, could be the field for you.  

How to Tell if Your “Encrypted” Web Traffic is Being Monitored

How to Tell if Your “Encrypted” Web Traffic is Being Monitored

In this blog post, we won’t be discussing theory or implementation details of Public Key Encryption.  Rather, we are going to look at it from a practical perspective by answering the question, “How can I tell if someone is spying, or trying to spy, on my web browsing?”

Brute Forcing a Login Page with Burp Suite

Brute Forcing a Login Page with Burp Suite

The purpose of this blog is to demonstrate how to brute force a login page using Burp Suite. There are other brute force tools such as Hydra and Ncrack. Although both are great tools, Burp Suite is more suitable for brute forcing a web application login page, whereas Hydra and Ncrack are more suitable for other protocols such as SSH and RDP.

Keeping Your Data Safe While Traveling

Keeping Your Data Safe While Traveling

If you are anything like myself and my co-workers at Alpine Security, you’re obsessed with Cybersecurity and the impact of poor implementations. If you’re not like us, good for you! But there are still some things you ought to be aware of to help you protect your data, especially when traveling.

Critical Security Controls: Part 0 – Introduction

Critical Security Controls: Part 0 – Introduction

Everyone knows that they need to improve the current state of their cybersecurity measures, but to many people this task is a daunting one.  “Where do I start?  What should I focus on first? What security measures will have the greatest impact on the security of my computer systems and network?” Don’t worry, the Center for Internet Security can answer all these questions, and help guide you to a more secure infrastructure. 

Cybersecurity Threats to Flying Taxis

Cybersecurity Threats to Flying Taxis

Flying taxis are soon to become reality. Dubai started testing taxi drones last year. The Volocopter is supposed to provide transportation for two passengers for up to 30-minute trips. The Volocopter and other flying taxis are supposed to publicly launch within five years. What are the cybersecurity risks associated with autonomous flying vehicles?

To Cert or Not Cert

To Cert or Not Cert

Since entering the IT field later in my career-life, I noticed an on-going debate amongst cybersecurity professionals: to cert or not to cert. There seems to be those (like myself) that push the obtainment of a certificate(s). On the flip side, there are those that tend to lump certificates into the “not-needed” category. Mostly, the argument is “learn it yourself”. This is especially true among “hackers”. I say “hackers” because the term hacker is actually a misnomer, and can be its own topic. The bigger picture considers whether a certificate outweighs a degree program.

Empire: A PowerShell Post-Exploitation Tool

Empire: A PowerShell Post-Exploitation Tool

This blog demonstrates how to download PowerShell Empire, a post-exploitation tool, in Kali Linux, create a script, make a connection back to your machine from the victim machine without Windows Defender blocking it, elevate privileges, and extract password hashes using Mimikatz. It is a versatile and useful tool that every penetration tester should have in their arsenal.

What Is This Internet of Things?

What Is This Internet of Things?

The IoT, as it is called, is a growing part of our lives and is something we all need to be aware of. Just last year (2017) there were reportedly 20 billion connected devices all around us. Every year, the number of IoT devices is rapidly growing. Although IoT devices make our lives easier, these devices are not safe from cyberattacks. 

Offline Password Cracking: The Attack and the Best Defense

Offline Password Cracking: The Attack and the Best Defense

Offline Password Cracking is an attempt to recover one or more passwords from a password storage file that has been recovered from a target system.  Typically, this would be the Security Account Manager (SAM) file on Windows, or the /etc/shadow file on Linux.  In most cases, Offline Password Cracking will require that an attacker has already attained administrator / root level privileges on the system to get to the storage mechanism. 

How to Protect Your Data with VeraCrypt

How to Protect Your Data with VeraCrypt

Today, encryption plays an important role in cybersecurity. It allows businesses to secure customers’ information, allows us to navigate the internet without the fear of anyone else eavesdropping, and allows remote employees to connect to the work network securely. However, even though encryption is crucial for protecting one’s data, not many average home users utilize encryption. Average home users should be encrypting their desktops, laptops, and mobile devices because encryption is the most useful technology for protecting one’s privacy. However, many people don’t know where to start; they are daunted by the technology. This blog will help you encrypt your drive using an open-source program called VeraCrypt.

Review: EC-Council’s Licensed Penetration Tester (Master) Exam 2.0: The World’s First Proctored, Hands-On Pentesting Examination

Review: EC-Council’s Licensed Penetration Tester (Master) Exam 2.0: The World’s First Proctored, Hands-On Pentesting Examination

The most significant difference with the new exam format is that it is proctored.  This means that you are being watched over your webcam for the entire period of the session.  Proctoring a five-day exam is impractical, so the exam was split into three six-hour sessions.  Each six-hour session consists of three individual “challenges”.  Each challenge involves recovering the contents of a secret file, but some challenges will require hacking more than one machine.  You enter the contents of the file into a web page and submit it when you are done with the session.  You must complete at least one challenge per session, and you must complete at least five out of the nine sessions to pass the exam.

The “Physical” Security of Cybersecurity

The “Physical” Security of Cybersecurity

We get so focused on encryption, identity access management, secure data transmission, etc., that we forget we have a PHYSICAL security component to our craft.As a former police officer for 20 years, the holidays brought with it happy times/sad times. People would go shopping for gifts.  They would load up their cars, and make one more store stop… and return to their car emptied of their newly purchased gifts.  They were in such a hurry, they forgot to lock the doors on the car when they ran inside.  Upon return, the car is empty.  Now is the time that we all need to take pause, and take stock of our SITUATIONAL AWARENESS.  That doesn’t just mean in the cyber-realm, but in our daily lives.

How to Securely Manage Passwords

How to Securely Manage Passwords

As cybersecurity professionals we know a “strong” password is, supposedly, one that is at least 8 characters long with a combination of upper case, lower case, numbers, and special characters.  But, as Bob Dylan said, the times they are a-changing. There is new movement in the industry to move away from this traditional password guidance to something more secure, user-centric, and friendly.

  • 1
  • 2
  • …
  • 4
  • 5
  • 6

BLOG SEARCH:

Connect with Us

Interested in our cybersecurity training or services? Complete the form below and we’ll get back with you right away. We appreciate your interest.


Recent Posts

  • The State of Ransomware 2020
  • National Cybersecurity Awareness Month: 6 Things to Practice During the Month
  • Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
  • What Is DevSecOps?
  • Cybersecurity and a Remote Workforce: What Does the Future Look Like?
  • 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
  • Incorporating Privacy and Security by Design into MedTech
  • What is the Difference Between CMMC, DFARS, and NIST 800-171?
  • At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
  • 5 Reasons to Hire a Fractional CISO
  • Why Private Cybersecurity Training Matters for Your Organization
  • Is the CEH Certification Right For You?
  • Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
  • Best Beginner Cybersecurity Certification to Get
  • Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing

Alpine Security is a member of the CISO Global family of companies.

Contact Us:

  • CISO Global
  • 6900 E. Camelback Road, Suite 900 Scottsdale, AZ 85251
  • 480-389-3444
  • info@ciso.inc
  • www.ciso.inc

Get Info

About Our Training
About Our Services
Meet the Team
Blog
Terms of Use
Privacy Policy

Join The Community

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Mail

Proud Partners

© 2021 · Alpine Security, a Cerberus Sentinel Company