Catfishing: Not Just About Money

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Catfishing, catfish

We live in a time where it is easier than ever to deceive people. For example, the internet now enables us to speak anonymously through message boards, comment sections, and even online games. Additionally, the internet can help you pretend to be a different person. Catfishing is the act of pretending to be someone else … Read more

DevOps Market: Novel Approaches & Products

Author(s):

Pratik Gundawar, ,

DevOps Market, Concept Of Devops, Illustrates Software Delivery Automation Through Collaboration And Communication, Infinity Symbol

How to Bring a Boom to the DevOps Market With competitive pressure increasing drastically and the digital economy progressing considerably, enterprises need to figure out new ways to plan, develop, and add value. Therefore, to adapt to digital transformation efficiently, DevOps has become a necessity to eliminate technical and cultural constraints for offering value rapidly. … Read more

Put a SOC in it

Author(s):

Tricia A. Howard, ,

NGSOC, Security Operations Center, Big room with computers on the wall, Chairs, SOC

As the security industry has exploded in recent years, the need for a SOC (Security Operations Center) is dire. The “security sprawl” has become outrageous. So many tools, platforms, and services – it’s almost every day that a new company or tech is emerging…

How to Clean Your Computer and Speed it up

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Clean Your Computer, Messy Desktop, Too Many Icons, Computer with messy home screen

It is important to regularly clean your computer. Every computer has two forms of storage, RAM and Hard Drive space. RAM is temporary storage. This dictates how many programs you can simultaneously run on your computer. If your RAM runs out, your computer will use the hard drive space to store the temporary memory. This … Read more

IOT Devices- Information Outsourcing Terror

Author(s):

Josh Henry, ,

Iot Device Alexa against a blue background, speech bubble with gears.

IoT Devices are on the Rise A rising trend in consumer markets today are the virtual assistant such as Amazon’s Echo or the Google mini. Juniper Research predicts that 55% of homes in the U.S. will feature an IOT device by 2022. This ushers in a debate regarding the privacy and security of your information. … Read more

Insider Threats – 2018 Statistics

Author(s):

Zehra Ali, ,

Evil man typing on computer, Insider Threats, cyber criminal.

Insider Threat (Fundamentals) As discussed, the insider threats are not always bred out of malicious nature. In fact, many insider threats exist due to the unintended or accidental happenings. More than 51% of companies are concerned about the unintentional insider attack. However, 49% of the companies are still worried about malicious insider, which do exist and are … Read more

Identity of Things: IoT Security

Author(s):

Tricia A. Howard, ,

Hand holding up interconnected city, innovation, IoT security, blue background, abstract

It is no secret that IoT Security (or lack thereof) has taken the industry by storm – and with good reason. Thanks to a couple of newsworthy incidents involving the (in)famous Internet of Things, most organizations are rethinking their overall IoT security posture. However, that is a daunting task to master. With such a variety … Read more

What is a Honeypot?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

honeypot sitting on a brown paper on a table. Spoon in honey. Honey jar.

In 1986, systems administrator Clifford Stoll noticed nine seconds of unpaid computer time at the Lawrence Berkeley National Laboratory. Upon being asked to resolve this, Stoll eventually came to the conclusion that a hacker had illegally gained access to their network by exploiting a vulnerability. Stoll decided he would set up a trap for the hacker. He … Read more

6 Tips for Getting the Most out of Cybersecurity Conferences

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Man speaking at a conference on cybersecurity conferences

An important part of cybersecurity is plugging into the surrounding community. Connectivity is a major component of spreading new innovations. Many security professionals enjoy attending conferences for this very reason. But when attending cybersecurity conferences, it is important to get the most out of your interactions. Therefore, here are some tips to make sure you … Read more