Posts for category: Best Practices

Russia’s Cyber Strategies

(By: William Beard on November 4, 2021) Executive Summary There has been an uptick in fourth and fifth-generation warfare in the last few decades and a major player in that has been ...

The Next Generation and Cyber Security

(By: William Beard on October 21, 2021) Executive Summary According to research recently published by the National Cybersecurity Alliance (NCSA), lack of cybersecurity training and education ...

Syniverse Short Message Service (SMS) Hack and Two Factor Authentication

(By: William Beard on October 5, 2021) Executive Summary Syniverse a Short Message Service (SMS) routing company based out of Hong Kong disclosed on September 27th, 2021, that it had been hacked ...

Agricultural Supply Chain Attack

(By: William Beard on September 30, 2021) Executive Summary The agricultural sector has been hit with yet another cyberattack in 2021. New Cooperative a Iowa based grain collective was hit ...

Apple Zero Click iMessage Exploit

(By: William Beard on September 17, 2021) Executive Summary Citizen Labs, a research group at the University of Toronto recently discovered a vulnerability in all of Apple’s operating ...

Security+ SY0-501 Domain 3 Architecture and Design: A look into Proper Input Validation

(By: Guy Nguyen-Phuoc on March 3, 2021) Introduction The best way to stop a disaster is to prepare for it and cyber disasters are no different. Architecture and design, defined by the ...

Security+ SY0-501 Domain 4 Identity and Access Management: A look into common account management practices

(By: Guy Nguyen-Phuoc on October 16, 2020) Introduction In 2016, the Central Intelligence Agency (CIA) experienced a data breach containing up to 34 terabytes of data (34,000,000,000,000 ...

Security+ SY0-501 Domain 2 Technologies and Tools: a look into weak security configurations

(By: Guy Nguyen-Phuoc on October 16, 2020) Introduction CISA (Cybersecurity & Infrastructure Security Agency) released an alert from their National Cyber Awareness System on April 29, ...

Security+ SY0-501 Domain 6 Cryptography and PKI: A look into AES and Encryption

(By: Guy Nguyen-Phuoc on October 16, 2020) Introduction April 20, 2020. The Federal Bureau of Investigation (FBI) has released an article on defending against video-teleconferencing (VTC) ...

Responding to a Cyber Security Incident

What is a Cyber Security Incident? A Cyber Security Incident is a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security ...