How to Keep your PC From Getting a Virus

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

A magnifying glass lays over a PC screen as blue spiked viruses float out of the PC screen.

Stop Replacing your PC Once Every Three Years. It is no secret that PC has a bad reputation. In addition to being viewed as the model that is more likely to receive a virus, PCs are seemingly built to break. According to most companies, when your computer slows down, or behaves unusually, it is simply time … Read more

How to use Tor Safely

Author(s):

Julia Sowells, ,

Welcome to Tor Browser tab is open

Browsing Anonymously  Tor, as many internet users may know, is a free software that helps establish anonymous communication between computers. The name originates as an acronym for the software project ‘The Onion Router’. ‘The Onion Router’ helps users conceal their location and usage and protects them from people conducting traffic analysis or network surveillance. This … Read more

6 Tips for Getting the Most out of Cybersecurity Conferences

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Man speaking at a conference on cybersecurity conferences

An important part of cybersecurity is plugging into the surrounding community. Connectivity is a major component of spreading new innovations. Many security professionals enjoy attending conferences for this very reason. But when attending cybersecurity conferences, it is important to get the most out of your interactions. Therefore, here are some tips to make sure you … Read more

Department of Defense (DOD) Cybersecurity Service Providers (CSSPs): A Unique Component of DOD’s Defense–in–Depth Strategy

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Business Woman Suit on Computer Cybersecurity DOD

An effective cybersecurity posture is achieved when there is confidence that information and information systems are protected against attacks through the application of security services in such areas as availability, integrity, authentication, confidentiality, and non-repudiation…