Category: Uncategorized

Posted in Uncategorized

Modernization of the DOD: VMware Hybrid cloud Capabilities and Portability

DoD hybrid cloud solutions like VMware on milCloud(r), 2.0 are essential to modernize defense. The Department of…

Posted in Uncategorized

How security policies, standards, procedures, and guidelines protect your business operations

Disclaimer: I have changed some key details to protect the privacy of a former client. However, the…

Posted in Uncategorized

How Ryuk Malware is Impacting Healthcare Industry

People are not the only ones who are facing this viral threat. Cyber-attacks are increasing from opportunistic…

Posted in Uncategorized

How can you spot Malware lurking in encrypted traffic?

Encryption is an important tool in maintaining privacy. It protects our data from prying eyes. It prevents…

Posted in Uncategorized

Darkside: Analysis of Large-Scale Data Theft Campaign

About Darkside, Inc. The Darkside ransomware group announced their RaaS (Ransomware-as-a-Service) in a “press release.” Since then,…

Posted in Uncategorized

Four Steps to Analyze Your Organizational Training Needs

Each organization and government body approaches training differently, as I have spoken with many different organizations and…

Posted in Uncategorized

Where’s the Beef? The Importance Of Preventative Cybersecurity In A Ransomware Riddled World

Another week, another shortage, it seems. COVID-19 taught us to expect this. However, the latest shortages of…

Posted in Uncategorized

Top Information Security Certifications 2019

Certification offers great potential, whether you are an entry-level IT professional, a CIO or something else. Technical…

Posted in Uncategorized

Hacking Ethics

Television and movies have convinced most people that hackers are malicious individuals whose motivations can be reduced…

Posted in Uncategorized

Software testers: The Quiet Giants of IT

As software capabilities increase, the importance of software testers has increased. Software testing is a priority for…