Blog
By: Omar Sickander
Â
In cloud container security, every misconfiguration can become a potential gateway for cyber threats. Imagine cloud containers as individual, self-contained boxes, each housing a unique application and its necessary components. To make things a bit simpler we will use an analo...
By: Omar Sickander
Originally thought to be patched, a subtle vulnerability challenges the integrity of cybersecurity at even some of the largest organizations. This vulnerability, known as the Heartbleed bug, was discovered in 2014 within OpenSSL versions 1.0.1 to 1.0.1f. It stemmed from a type of...
In the rapidly evolving landscape of cybersecurity, effective communication with boards of directors has emerged as a critical concern for organizations worldwide. As cyber threats grow in complexity and severity, the lack of communication between cybersecurity professionals and board-level decision...
By: Kara Twombly, Zariah Williams, Markisha Beason & Omar Sickander
As the digital landscape expands at an unprecedented pace, the need for robust cybersecurity measures has become paramount. Artificial intelligence (AI) and machine learning (ML) are technologies that are revolutionizing the field ...
By: Zariah Williams &Â Omar Sickander
You’ve heard of megabytes (MB) and gigabytes (GB), but have you ever heard of zettabytes? A singular zettabyte (ZB) is equivalent to 1,000,000,000,000,000,000,000 (1021) bytes. In 2018 it was estimated that the entire world’s data was equal to 33 ZB. Experts cal...
By: Omar Sickander & Zariah Williams
Â
It’s that time of year once again when sports lovers settle in for a month of game-watching, bet-making, and trash-talking. This week kicks off the NCAA Basketball Tournament, also known as March Madness, where 68 men’s and women’s teams will compete in a sin...
    Cybersecurity Awareness month has ended, but the importance of cybersecurity-minded organizations and training should not be forgotten. It may not be easy to implement all the innovative ideas and programs showcased by organizations worldwide last month, but it is necessary for an organizati...
By: Keyaan Williams
Â
Once upon a time, Omar Sickander and I created the Cyber Career Lab (TM) to provide an alternative to expensive certifications and higher education that still helped people grow in their cybersecurity careers. “Ask me Anything” is an extension of the program that helped me an...
By: Sebastian Savage
 If you are deeply plugged into the digital world, more than likely, you are familiar with the term Cybersecurity Awareness. If you have never heard the term, don’t worry, cybersecurity awareness means: Following and implementing specific steps or controls to keep your personal...
 By: Elizabeth Peters
You have heard the term Internet of things (IoT) before, but what does it mean for you and your security? The Massachusetts Institute of Technology (MIT) Auto Labs was the first to implement the idea of the Internet of Things (IoT) in the early 1990s. Additionally, the first a...
Cybersecurity is the protection against unauthorized access, use, or damage to computer information systems and electronic data. There are various aspects of cybersecurity; it can involve action by individuals or groups, such as cyberterrorism and cybercrime. It can also be a state response to such ...
 (From National Cybersecurity Alliance)
In this day and age, employees are more connected than ever. The hybrid workplace is here to stay, and for employees, this means relying on connected devices from their home office setups. According to recent data, smart home systems are set to rise to a mark...