credentials

How to Manage Security Risks and Be Happy

With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.

Stuck in Cybersecurity Hell? Professional Education Is the Only Way Out

If we want to escape from “cyber hell” – then professionals will need additional training, not only to learn the latest technology, but also to understand public policy and organizational management. Howard Shrobe is looking to change this through professional education initiatives at MIT.

Curiosity Didn’t Get the Best of Him; It Led to a Career

An IT security professional realizes that his life’s mission to protect information harks back to being a curious youngster who absconded his teacher’s log-in credentials and then poked around the school’s rudimentary computer network. Little did he know, a rewarding career lay ahead.

Happy Ransomware Year, MongoDB!

Malicious actors are wasting no time in kicking off 2017…in the past week we’ve seen an active and growing ransom campaign against over 10,000 unsecured Internet-facing data MongoDB instances. Here expert Jason Garbis explores this situation a bit more, and then takes a step back for some analysis.

Looking For Creative People To Fill Positions in Technology Space. True Story

With more than 25 years’ experience in the IT field, ISACA Director Jo Stewart-Rattray has a lot of experience and advice to share. Determine what you want to do in technology, find your own path, and make it happen. And until you’ve actually tried something, don’t place imaginary obstacles in your own path.

Putting SpyEye Developers Behind Bars

Thanks in part to research and testimony by Flashpoint, two hackers responsible for developing malware that infected over 50 million computers have been sentenced to prison. Expert Lance James from Flashpoint walks us through the history of arrests that likely halted what could have been the most prolific and undetectable botnets distributed to date.