Proxies, Pivots, and Tunnels – Oh My!

Forward When talking about a proxy or a pivot or a tunnel, we could be talking about very different things.  However, to me, these terms could mean the same thing too.  A proxy could be considered a pivot, especially in ‘forward proxy’ mode, when it ma… Continue reading Proxies, Pivots, and Tunnels – Oh My!

Inadequate skills and employee burnout are the biggest barriers to digital transformation

Nearly six in ten organizations have accelerated their digital transformation due to the COVID-19 pandemic, an IBM study of global C-suite executives revealed. Top priorities are shifting dramatically as executives plan for an uncertain future Digital … Continue reading Inadequate skills and employee burnout are the biggest barriers to digital transformation

How vital is cybersecurity awareness for a company’s overall IT security?

The benefits of cybersecurity awareness programs are currently the subject of broad discussion, particularly when it comes to phishing simulations. Nowadays, companies not only invest in IT security solutions, but also in the training of their employee… Continue reading How vital is cybersecurity awareness for a company’s overall IT security?

Lessons From Teaching Cybersecurity: Week 1

As I had mentioned previously, this year, I’m going back to school. Not to take classes but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Addi… Continue reading Lessons From Teaching Cybersecurity: Week 1

Permanent remote work puts greater pressure on IT teams

82% of IT leaders think their company is at a greater risk of phishing attacks, and 78% believe they are at a greater risk of an insider attack, when employees are working from home, according to a report from Tessian. The research addresses the IT and… Continue reading Permanent remote work puts greater pressure on IT teams

Helping Inspire the Next Generation of Cybersecurity Professionals

If you had asked 10 year old Tyler what he wanted to be when he grew up, the answer would have been a very enthusiastic, “Teacher!” Over time, however, that desire lessened as my fascination with technology grew. I ultimately ended up attending Fanshaw… Continue reading Helping Inspire the Next Generation of Cybersecurity Professionals

Infosec pros struggle to find opportunities to improve their work skills

Cybrary released the findings from the report which examines the current challenges, perceptions, and impacts of the cybersecurity skills gap faced by IT and security teams worldwide. Security teams and the growing skills gap The survey questioned resp… Continue reading Infosec pros struggle to find opportunities to improve their work skills

Punching robot designed for mixed martial arts training

While many fighters train with a punching bag, it’s not really a fair fight – after all, the bag can’t punch back. Stryk’s new RXT-1 training robot, however, does exactly that.Continue ReadingCategory: Sports, LifestyleTags: Robots, Kickstarter, Traini… Continue reading Punching robot designed for mixed martial arts training

How to configure Android (Virtual) for Mobile PenTest

This post is about setting up an Android Virtual Machine (AVD) for a mobile application penetration test.
The post How to configure Android (Virtual) for Mobile PenTest appeared first on Security Boulevard.
Continue reading How to configure Android (Virtual) for Mobile PenTest

Phish Scale: New method helps organizations better train their employees to avoid phishing

Researchers at the National Institute of Standards and Technology (NIST) have developed a new method called the Phish Scale that could help organizations better train their employees to avoid phishing. How does Phish Scale work? Many organizations have… Continue reading Phish Scale: New method helps organizations better train their employees to avoid phishing