Industry Certifications and How to go About Getting Them

Author(s):

Tailor Tolliver, ,

Finger pressing button Industry Certifications Abstract

What are the best certifications to get when entering the field of Cybersecurity? Newcomers ask me this question. Often I find myself recommending my personal favorites.  However, not everyone may require the same certifications as someone else. Cybersecurity is a vast umbrella and there are so many different titles one can acquire while pursuing this … Read more

Cybersecurity Services

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

hand holding cloud connected to apps, raining information, cybersecurity services

There are a lot of common issues that plague your digital devices. Traversing the internet is no simple task in 2018. For example, one in thirteen web requests lead to malware. It is incredible likely that your computer will get a virus at some point in your lifetime. That likelihood grows yearly. This is seen … Read more

What is a Firewall and How Does it Work?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cords plugging into a system firewall

Firewalls have essentially been around since the beginning of the internet. A firewall is a network device designed to protect your system by monitoring and controlling information traffic based on a preset list of rules to ensure security. Firewalls establish a barrier of protection between a trusted network and a foreign network. They are one … Read more

8 Simple Steps to Ensure Website Security

Author(s):

Julia Sowells, ,

Frayed Wirsed with blocks in between them spelling out Site Down as a metaphor for website security

Website Security  Now and again, the best techniques to handle any work are the easiest ones. It is necessary to protect your website from malicious hackers. However, once you find out the vulnerabilities of your website, you will find yourself in a complex situation that requires complex solutions. All things considered, there are essential accepted … Read more

What is a Honeypot?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

honeypot sitting on a brown paper on a table. Spoon in honey. Honey jar.

In 1986, systems administrator Clifford Stoll noticed nine seconds of unpaid computer time at the Lawrence Berkeley National Laboratory. Upon being asked to resolve this, Stoll eventually came to the conclusion that a hacker had illegally gained access to their network by exploiting a vulnerability. Stoll decided he would set up a trap for the hacker. He … Read more