Onto the Next One The Certified Ethical Hacker (CEH) certification has become a pervasive staple in cybersecurity and in penetration…
read moreQTNA: Cross-Site Scripting (XSS) In N2K’s Questions That Need Answers (QTNA) video series, we tackle some of the most testable…
read moreCalifornia to Mandate Gender Diversity in the Boardroom California legislators have recently passed a bill that would mandate publicly-traded companies that…
read more“This post is part two of our reaction to new recommendations in the National Institute of Standards’ Digital Identity Guidelines…
read morePop quiz. Log 100 = ? Unless you are a mathematician (or total nerd) you probably don’t know the answer.…
read moreCalculating the Overlooked Costs of Cyber Incidents When executives consider the financial impacts of cyber incidents, they tend to focus…
read moreQTNA: XMAS Scanning In N2K’s Questions That Need Answers (QTNA) video series, we tackle some of the most testable and…
read moreA Cyber Vaccine In medicine, vaccines are used to prepare the body to attack viruses and treat illnesses. Pharmaceutical companies…
read moreQTNA: Two-Factor Authentication In N2K’s Questions That Need Answers (QTNA) video series, we tackle some of the most testable and…
read moreThe Not So Small or Medium-Sized Threat to SMBs A new year has arrived. It’s 2019 and employees from Efficient…
read more