Healthcare organizations are sitting ducks for attacks and breaches

Seventy-three percent of health system, hospital and physician organizations report their infrastructures are unprepared to respond to attacks. The survey results estimated 1500 healthcare providers are vulnerable to data breaches of 500 or more record… Continue reading Healthcare organizations are sitting ducks for attacks and breaches

Lessons from Teaching Cybersecurity: Week 6

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Add… Continue reading Lessons from Teaching Cybersecurity: Week 6

Cybersecurity training: Learn how to secure containerized environments

Driven by a strong curiosity to know how computers and computer programs are made, how they work, and how safe they are, Sheila A. Berta, Head of Security Research at Dreamlab Technologies, has been interested in cybersecurity since her early teens. Fo… Continue reading Cybersecurity training: Learn how to secure containerized environments

Survey: Cybersecurity Skills Shortage is ‘Bad,’ But There’s Hope

Automation, strategic process design and an investment in training are the keys to managing the cybersecurity skills gap, according to a recent survey from Trustwave. Continue reading Survey: Cybersecurity Skills Shortage is ‘Bad,’ But There’s Hope

Enterprise IT security teams continue to struggle

CyberEdge conducted a web-based survey of 600 enterprise IT security professionals from seven countries and 19 industries in August 2020 in an effort to understand how the pandemic has affected IT security budgets, personnel, cyber risks, and prioritie… Continue reading Enterprise IT security teams continue to struggle

Businesses struggle with data security practices

43% of C-suite executives and 12% of small business owners (SBOs) have experienced a data breach, according to Shred-it. While businesses are getting better at protecting their customers’ personal and sensitive information, their focus on securit… Continue reading Businesses struggle with data security practices

Boolean Math (NOT Logic) – CISSP Domain 3

Hello everyone.  We’ve got another Boolean math session lined up for you today.  This time we’re going to take a quick look at the NOT logic and examine how this one differs from the other operations. To review, Boolean math is based on a binary system… Continue reading Boolean Math (NOT Logic) – CISSP Domain 3

The Death and Rebirth of Musashi.js OR How I turned personal failure into better teaching tools.

A little background… As I stood in front of a class of developers trying to explain cross-origin resource sharing (CORS), I knew I wasn’t conveying it well enough for a significant subset of the group. It was Autumn 2017 (not my password at the time, b… Continue reading The Death and Rebirth of Musashi.js OR How I turned personal failure into better teaching tools.

LD_PRELOAD – Introduction

    Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD is related to Linux based systems and revolves around the loader system and how shared object libraries resolve linker symbols when loading a dynami… Continue reading LD_PRELOAD – Introduction

Lessons From Teaching Cybersecurity: Week 2

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Addi… Continue reading Lessons From Teaching Cybersecurity: Week 2