On August 22nd, Tyrone E. Wilson the Founder & President of Cover6 Solutions discussed how to break into the cybersecurity industry and how to set
On Tuesday, June 14th, 2018 we discussed Avalon, a free SaaS web application enabling security analysts to reduce time spent on threat investigations from hours to minutes through real-time
On Tuesday, May 15th, 2018 we discussed Developing Your Cyber Career Action Plan with Teresa Allison, an Independent Consultant of MBO Partners. This webinar is a great opportunity to know how
On Tuesday, March 6th, 2018 as we discussed Threat Intel 101 with Aaron Gee-Clough, CTO at King & Union. Feeling a bit inundated with threat feeds? We understand that threat intelligence
On Thursday, December 28th, 2017 we discussed Multifactor Authentication Challenges with Jeremy Duncan of Tachyon Dynamics. Multifactor Authentication (MFA) comes in many different types and
On Wednesday, December 6th, 2017 as we discussed Breaking into Cyber. This virtual meetup is a great opportunity to hear from seasoned professionals and learn what it takes to
Human error is the primary contributing factor that leads to malicious activity in cybersecurity. Other domains such as aviation, healthcare, and nuclear power have capitalized on human factors.
When most people hear “hacking,” they think of offensive tools and software. Still, defensive tools play a big part in incident prevention, handling, response/recovery, and forensics.
Web applications provide a vulnerable window into private enterprises. These applications often process and use poorly validated input. This presentation discusses methodologies to identify and exploit such vulnerabilities within the apps.
We understand that this certification is an advanced one to study for, so we’d like to provide you with all the help that we can. Our FREE virtual training will help you gain familiarity with key terms, and you will have the opportunity to ask Donald Parker any CISSP questions that you have.
Having a clear understanding of buffer overflows requires lots of devotion, time, and effort. It shows that you have a passion for information security and is a sure fire way to land a great job.