Equifax was Careless With Your Data

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Josh Henry, ,

Data breach and private personal information theft as a technology security concept as a digital thief stealing code as a computing risk idea in a 3D illustration style. Equifax

The Cost of Carelessness Is it possible to quantify carelessness? Recent news about Equifax has shown the veracity of carelessness seen in the cybersecurity department of major corporations and countries. This year alone, we have seen many companies that we trust with our personal information fail us. Because of this, the catastrophic failures of cybersecurity … Read more

Cybersecurity Market: Trending Upwards

Author(s):

Josh Henry, ,

Cybersecurity Market coins in front of graph

Rising Cybersecurity Market Trends      The cybersecurity market is rapidly expanding in today’s society; and rightfully so. The steady increase in data breaches and threats to our identities show no signs of slowing down. Additionally, the demand for professionals in the cybersecurity market field is rapidly growing According to an article from Cybersecurity Ventures, the estimated … Read more

Hospitality Breaches

Author(s):

Josh Henry, ,

Hospitality Breach picture of Courtyard Marriott

Leaving the Light on for Everyone Hospitality breaches are the newest target for bad actors. Data breaches are making headlines more and more. As a result, large corporations in the hospitality industry are acquiring large targets on their back. Of course, this is no surprise. In fact, this problem has escalated since last year. Needed … Read more

Doxing: The Dark Side of OSINT

Author(s):

Patrick Putman, ,

Computer screen showing Doxing

Exploiting a target is much easier when you know their vulnerabilities. However, learning their vulnerabilities can only come from research. Doxing is a form of Open Source Intelligence. The word originated from an abbreviation of the term “dropping documents.” Doxing is the dark side of OSINT. It is the act of compiling a dossier against … Read more

Blockchain Meets Cybersecurity

Author(s):

Zehra Ali, ,

Blockchain abstract, blue chain links

Where Blockchain Meets Cybersecurity Blockchain technology is a powerful public ledger that records every “block” of data as it moves across many computers. Businesses of all types and sizes have to deal with a lot of information on a daily basis. Data is usually an extremely valuable asset for their operations. But keeping it safe … Read more

Cyber Insurance: Be Prepared for a Breach!

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Puzzle piece being placed in a puzzle. The piece is labeled Cyber Insurance.

At the end of the day, we trust that the internet is safe. Now, many people will protest to this statement. But the mere fact that you send emails, make online purchases, or have a social media account shows your sense of security. However, this security is bred out of necessity. No matter the job … Read more

National Cyber Security Awareness Month

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

National Cyber Security Awareness Month, binary code particles and neon glowing cyber wave. in modern server room

Each October, National Cyber Security Awareness Month rolls around. Sponsored by the National Cyber Security Division, this month encourages us to approach our digital lives with awareness and caution. The NCSA takes time this month to reach out to Americans with tips for cyber hygiene. Additionally, the NCSA provides educational guides to online security. The … Read more

Cybersecurity Services

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

hand holding cloud connected to apps, raining information, cybersecurity services

There are a lot of common issues that plague your digital devices. Traversing the internet is no simple task in 2018. For example, one in thirteen web requests lead to malware. It is incredible likely that your computer will get a virus at some point in your lifetime. That likelihood grows yearly. This is seen … Read more