The Future Risks of Smart Contracts
In its simplest form, Smart Contracts are programmable logic (or code) that exists on a blockchain. It is commonly used to define terms or agreements...
How To Move Emails Directly Into Folders Using Gmail
One of the most successful ways to organize your Gmail is using the labels and filters option. Today, I will show you how to...
Breaking Into I.T. in 2022 With These Tools [VIDEO]
Now more than ever, there is a significant need for IT Professionals. Whether you are brand new to the field, transitioning between jobs or...
Escaping Traditional Cyber Security Awareness Training
One of the apparent challenges many have with today’s methods of learning is literally consuming the same material without flair or consequences. In hindsight,...
Hacker Attempts To Poison Florida Water Supply
Last week it was reported that a Florida metropolitan water plant was a victim of a cyber attack. The threat actor reportedly accessed the...
Cyber Security Awareness Month – Dumpster Diving
As the old adage goes, one man's trash is another man's treasure. That wisdom is no truer than the art of Dumpster Diving. ...
Sage N Clements on Insurance Requirements
A friend of mine ask me to be a guest host on their inaugural podcast to talk about Cyber Insurance and Information Security. I...
Cyber Security Awareness Month – Suspicious Emails
As you may know, October is Cyber Security Awareness month. Being an IT Security Professional, I wanted to use this month to provide a...
The Case To Ban TikTok In 2020
In recent weeks, reports from the IT Security community have surfaced that a popular short-form video app, called Tiktok may be collecting excessive and potentially...
How to do Virtual Conferences The Right Way
Today marks the first time I have attended a virtual industry conference and I must say it’s bittersweet. On one end, I always find...