On Thursday, October 11th, 2018 we discussed Command and Control with PowerShell Empire. An important part of performing penetration tests, and identifying malicious activity as a defender, is
Cybersecurity Blog | Cover6 Solutions
The Cover6 Solutions blog provides the latest information security news and hands-on cybersecurity tutorials from seasoned professionals.
On August 22nd, Tyrone E. Wilson the Founder & President of Cover6 Solutions discussed how to break into the cybersecurity industry and how to set
On Tuesday, June 14th, 2018 we discussed Avalon, a free SaaS web application enabling security analysts to reduce time spent on threat investigations from hours to minutes through real-time
Healthcare cybersecurity is a growing concern. In the last few years, IT security incidents and hacking are increasing steadily, and many healthcare organizations have struggled
When I signed up to be a guest blogger for Cover6 Solutions, I didn’t know what I would write about, especially since I don’t have
On Tuesday, May 15th, 2018 we discussed Developing Your Cyber Career Action Plan with Teresa Allison, an Independent Consultant of MBO Partners. This webinar is a great opportunity to know how
On Tuesday, March 6th, 2018 as we discussed Threat Intel 101 with Aaron Gee-Clough, CTO at King & Union. Feeling a bit inundated with threat feeds? We understand that threat intelligence
On Thursday, December 28th, 2017 we discussed Multifactor Authentication Challenges with Jeremy Duncan of Tachyon Dynamics. Multifactor Authentication (MFA) comes in many different types and
On Wednesday, December 6th, 2017 as we discussed Breaking into Cyber. This virtual meetup is a great opportunity to hear from seasoned professionals and learn what it takes to
Before I start to help, I always like to ask them this question; What is your dream job? I ask this because no matter how much I would want it to be, I understand #Cyber may not be for everyone.
Human error is the primary contributing factor that leads to malicious activity in cybersecurity. Other domains such as aviation, healthcare, and nuclear power have capitalized on human factors.
When most people hear “hacking,” they think of offensive tools and software. Still, defensive tools play a big part in incident prevention, handling, response/recovery, and forensics.