dcsimg

Top 5 Hacking and Cyber Security Books of 2020

Continuous learning is a top priority for me.  It’s critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading the likes of Shakespeare and was more interested in the … [Read more...]

Hardening Windows Endpoints Against Cyber Attack: Part II

In Part I of the blog series, Hardening Windows Endpoints Against Cyber Attack, I covered the first three steps of an ethical hack. Step 0: Pre-Engagement Step 1: Passive Recon Step 2: Active Recon Now the run really begins. In this blog post, you’ll learn how to put all the knowledge you gained during the planning and reconnaissance steps into action. Let’s walk through the next steps: Step 3: … [Read more...]

Hardening Windows Endpoints Against Cyber Attack: Part I

To secure Windows endpoints against cyber attacks, it helps to think like a cyber criminal. Cyber criminals look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access to sensitive information. As part of the ethical hacking community, my ultimate goal is to help you secure your organization. … [Read more...]

Cyber Security Trends and Predictions for 2021, and Reflections on 2020

Well, 2020 was surely a year to remember—or one that most of us will want to forget.  No one could have predicted the turn it would take, and some are still trying to decide what to do with all the toilet paper they bought (which at some point was possibly one of the highest valued assets people owned second to bitcoin.) The year was likely a gap year for most kids and university students.  The … [Read more...]

Cyber Security and the Future of Connected Devices

Before I take you on a journey to the future of connected devices, let’s briefly reflect on how we got where we are today. During my career, I’m fortunate to have been involved in many exciting technology and digital innovations. It’s important to share some of these with you so you fully understand how amazing technology can be and what an exciting future lies ahead. That said, … [Read more...]

Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime

Cybersecurity is no longer simply a technology challenge. It’s a challenge for everyone who interacts with technology. The protection of work and personal life are no longer separated. They’ve become intertwined thanks to social networks, the Internet of Things, and unlimited connectivity. This means cybersecurity is no longer solely the responsibility of a company IT department, but the … [Read more...]

How do you make cyber security tech buying decisions? Here’s what your peers say.

Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how IT and security professionals make technology buying decisions, and what most influences Boards to invest in cybersecurity. The new report, entitled, Cyber Security Team’s Guide to Technology … [Read more...]

National Cyber Security Awareness Month: If you connect it, protect it

Can you spot the red flags of a cyber crime? What behaviors do cyber criminals love to abuse? Here’s how to avoid being the next victim! Cyber security is no longer just a technology challenge. It’s a challenge for everybody who uses and interacts with technology daily. The protection and security of both your work and personal life are no longer separate—they have been … [Read more...]

The Impact of the California Consumer Privacy Act on Privileged Access Management

Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving changes in data governance and security practices. The California Consumer Privacy Act (CCPA) has the broadest impact of any U.S. state or federal privacy law, as it directly impacts 40 million … [Read more...]

PAM cloud security is different. Let me explain why

The 2020 Verizon Data Breach and Incident Report (DBIR) published in May gives a clear indication of where privileged access management (PAM) security is going these days. And the forecast is for cloudy skies ahead.  That’s because: 77% of cloud breaches are due to compromised credentials Attacks on web applications more than doubled in 2019 With credentials as the overwhelmingly preferred attack … [Read more...]