The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…
“Hello! My Name is Phoummala and I have re-occurring imposter syndrome. I struggle with this frequently and it’s a battle that I know I am not alone in.” What is…
In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…
When the IT Show Comes to Town In the past, I’ve compared the logistics of tech conferences, tradeshows, and user groups to moon landings, touring companies, and polar expedition planning.…
In the first blog of this series, we became familiar with some well-used cybersecurity terminology. This blog will look at some well-known cyberattack and threat types and how they can…
In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challenging. In fact, most…
Security should be a top priority for IT professionals within all areas of skills. One of the top pain points is how to convey the story of security to upper…
In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few…
Building a culture that favors protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data…
Here is an interesting article from my colleague Joe Kim, in which he discusses the impact of artificial intelligence on cybersecurity. Agencies are turning to artificial intelligence (AI) and…