IT Certifications to Elevate Your Skillset

The cybersecurity and tech job markets are booming and it’s a great time to be a job seeker or employee in this field. Just because there’s job security doesn’t mean that you should let off the gas pedal. As an employee or prospective… Continue reading IT Certifications to Elevate Your Skillset

The State of Cybersecurity Training and Certifications with Kevin Johnson

In episode 87 of our monthly show, frequent guest Kevin Johnson joins us to discuss the current state of cybersecurity training and certifications. If you’re currently in the industry or pursuing a career in cybersecurity this is one episode not … Continue reading The State of Cybersecurity Training and Certifications with Kevin Johnson

Excellent Analysis of the Boeing 737 Max Software Problems

This is the best analysis of the software causes of the Boeing 737 MAX disasters that I have read. Technically this is safety and not security; there was no attacker. But the fields are closely related and there are a lot of lessons for IoT security — and the security of complex socio-technical systems in general — in here. EDITED… Continue reading Excellent Analysis of the Boeing 737 Max Software Problems

Vulnerabilities in the WPA3 Wi-Fi Security Protocol

Researchers have found several vulnerabilities in the WPA3 Wi-Fi security protocol: The design flaws we discovered can be divided in two categories. The first category consists of downgrade attacks against WPA3-capable devices, and the second category … Continue reading Vulnerabilities in the WPA3 Wi-Fi Security Protocol

Vulnerabilities in the WPA3 Wi-Fi Security Protocol

Researchers have found several vulnerabilities in the WPA3 Wi-Fi security protocol: The design flaws we discovered can be divided in two categories. The first category consists of downgrade attacks against WPA3-capable devices, and the second category consists of weaknesses in the Dragonfly handshake of WPA3, which in the Wi-Fi standard is better known as the Simultaneous Authentication of Equals (SAE)… Continue reading Vulnerabilities in the WPA3 Wi-Fi Security Protocol

2019’s Hottest, and Most Bankable, Security Certs

Most certifications can help your career, but a select few will land you a great job or add money to your paycheck. Here are the most bankable certifications this year, as well as a glimpse of next year’s most wanted list, according to those in the fi… Continue reading 2019’s Hottest, and Most Bankable, Security Certs

Federal Agencies Fell Short in Assessments of Cybersecurity Employees, Finds Report

The skills gap poses a persistent challenge to organizations. Enterprises need a qualified workforce if they are to adequately defend against digital threats. This is true for every industry and is especially so for the public sector. Acknowledging tha… Continue reading Federal Agencies Fell Short in Assessments of Cybersecurity Employees, Finds Report

Brian Ventura and Ted Gary – Enterprise Security Weekly #50

Brian Ventura is a SANS Instructor and infosec architect, while Ted Gary serves as the Product Marketing Manager at Tenable. Brian and Ted have been working on a project that highlights the first five security controls, which are: Inventory of Authorized and Unauthorized Devices 6 Inventory of Authorized and Unauthorized Software 10 Secure Configurations for […] Continue reading Brian Ventura and Ted Gary – Enterprise Security Weekly #50