-
By CompTIA
| October 23, 2018
By last Halloween, cybersecurity professionals had realized that 2017 was the year of malware. For Halloween 2018, it’s time to ask, what has malware become? What is it turning into for 2019?
Full Story
-
By Steve Slawson
| October 22, 2018
When it comes to securing a typical IT system, data confidentiality and integrity are typically the primary concerns. But for the systems that control critical infrastructure, like nuclear power plants, public health and safety come first.
Full Story
-
By Debra B. McCraw
| October 19, 2018
You’ve decided you want to get into cybersecurity, and now it’s time to get credentials. But what is the difference between a cybersecurity certificate, a certification and a degree, and how do you know which is right for you?
Full Story
-
By CompTIA
| October 18, 2018
In the next Office Hours with James, we’re going to set up two-factor authentication using Authy and Secure Shell (SSH). By the end of this hour, you’ll be using two factors of authentication, completely bypassing passwords.
Full Story
-
By Patrick Lane
| October 17, 2018
CASP is often compared to (ISC)2 Certified Information Systems Security Professional (CISSP), and many IT pros ask themselves, “which certification is right for me?” Both exams assess advanced-level cybersecurity skills and are vendor neutral, but the similarities stop there.
Full Story
-
By CompTIA
| October 16, 2018
This survey has closed.
Full Story
-
By CompTIA
| October 16, 2018
Preparation is the most important aspect of passing an IT certification exam. Since test prep and IT certification exams require investments of time and money, it’s wise to plan your IT learning and follow that plan through to completion.
Full Story
-
By Seth Robinson
| October 15, 2018
Just as security is becoming more critical, it is also becoming more complex. One tactic that companies are exploring to address the growing importance and complexity of cybersecurity is the creation of focused security teams.
Full Story
-
By Heather Macchi
| October 12, 2018
Heather Macchi didn’t exactly know what career she wanted to pursue but found herself working for an IT company. This exposure to technology paired with a passion for problem solving and a desire to continue learning led her from sales to IT.
Full Story
-
By James Stanger
| October 10, 2018
The “act like a hacker to stop the hacker” approach just really doesn’t work. Neither does the "quarterly compliance" pen test. You need to turn your attention away from fear-based defender’s dilemma thinking to a proactive, more useful approach: focusing on the attacker’s dilemma.
Full Story