Information Security Leader, Author, Instructor and Speaker

Default utility Image

Understanding FERPA: How K–12 Schools Can Update Their Data Privacy Approach TAGS: Administrators and educational staff at schools around the country understand the importance of protecting student privacy. The Family Educational Rights …Continue reading →

Default utility Image

Is certification a reliable means of learning new IT skills and concepts? TAGS: Earning a technology certification requires some significant investments of both money and time. Candidates purchase study materials, pay tuition for …Continue reading →

Default utility Image

How to encrypt and secure a website using HTTPS TAGS: | Encrypting web content is nothing new: It’s been nearly 20 years since the publication of the specification for encrypting web …Continue reading →

Default utility Image

Fact or Fallacy: Stay Up to Date on the Best Practices for Password Security How much do you know about passwords? You might believe password authentication is old hat, and that you already know …Continue reading →

Default utility Image

Wireshark tutorial: How to use Wireshark to sniff network traffic TAGS: | | Wireshark continues to be one of the most powerful tools in a network security analyst’s toolkit. As a network packet …Continue reading →

Default utility Image

5 Questions to Ask About Buying AI-Enabled Security Software Security products incorporating artificial intelligence techniques may reduce the workload for human analysts,taking over the time-consuming job of correlating information sources and mining …Continue reading →

Default utility Image

Six Niche Security Certifications Sometimes you have to step off the beaten path to find the right certification. Let’s take a look at the …Continue reading →

Default utility Image

SIEM vs SOAR: What?s the Difference, and Do Businesses Need Both? The cybersecurity world is full of acronyms; it’s difficult to go an entire year without vendors beating down the door …Continue reading →

Default utility Image

Strategies to mitigate cybersecurity incidents need holistic plans TAGS: | Cybersecurity incidents carry with them tremendous potential for financial, operational and reputational damage to organizations. To stay ahead of the …Continue reading →

Default utility Image

Incident response: How to implement a communication plan TAGS: Cybersecurity incidents require careful coordination between the incident response team and a variety of internal and external stakeholders. An incident …Continue reading →