Cyber Self-Defense

Cyber Self-Defense Is Not Complicated

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass … Read more

Cybersecurity Facts and Stats - Reasons Why You Should Join the Cybersecurity Industry

Cybersecurity Facts and Stats

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Cybersecurity is more than a person behind a screen or hackers in hoodies. Cybersecurity is one of the fastest growing career fields and for good reason: cybersecurity is a universal need. Cybersecurity encompasses everything relating … Read more

Hackers, White Hat, Black Hat, Red Hat, Gray Hat, Hacktivists and Script Kiddies

HACKERS: THE 411

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

White Hat, Black Hat, Gray Hat, Hacktivists, we hear all of these names, but what is hacking and who are they? What are the different types of hackers? Why hack? The media has used this … Read more

KBA and Data Breaches

Proving a Negative

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

Proving there is a “you” has never been easier; proving you are the only you, not so much. We learned in math class in high school that you cannot prove a negative. Or to be … Read more