Maximizing Email Security: Understanding the Importance of DKIM, SPF, and DMARC

Email is a crucial part of our daily lives, but unfortunately, it’s also a popular target for cybercriminals who use various tactics like spam, phishing, and spoofing to scam people. The FTC recently issued a warning to users of MetaMask and PayPal about phishing scams that are currently circulating through fake emails. The scam claims that the user’s cryptocurrency wallet has been blocked and encourages them to click a link and update their wallet to prevent the loss of their crypto. To protect email users from these threats, authentication protocols like DKIM, SPF, and DMARC are strongly recommended.

Investigating the FAA Outage: Separating Fact from Fiction

On January 11th, the Federal Aviation Administration (FAA) experienced a nationwide outage that caused widespread delays and cancellations for flights across the United States. The outage was caused by a problem with the FAA’s NOTAM (Notice To Air Mission) system.

NOTAMs are messages issued by the FAA to provide pilots with important information about flight restrictions, hazards, and other critical information. The NOTAM system is a critical component of the FAA’s air traffic control infrastructure, and the outage caused a ripple effect throughout the entire aviation system.

What Is Symmetric Encryption? [VIDEO]

Symmetric Encryption is an algorithm that uses the same secret key to both encrypt and decrypt plaintext into ciphertext….

CISSP Domain 1 Notes

Last week, both our YouTube Channel and the blog reached milestones I anticipated taking year to accomplish. It is difficult to put into words how thankful I am. As a way of expressing my gratitude, I’m making available the notes I used to pass the CISSP.

Escaping Traditional Cyber Security Awareness Training

One of the apparent challenges many have with today’s methods of learning is literally consuming the same material without flair or consequences. In hindsight, I can see where that would be an issue.

Hacker Attempts To Poison Florida Water Supply

Last week it was reported that a Florida metropolitan water plant was a victim of a cyber attack. The threat actor reportedly accessed the water plant’s supervisory control and data acquisition or SCADA…

Studying The CISSP Using Amazon Echo

Many of you are probably thinking to yourself that I’m crazy but I assure you on this topic, I am not. The Amazon Echo (Alexa) is one of the most underrated and most powerful tool available on the market. Not only can it tell you the weather, lock your front door, play music and tell you when a local store is open but it can read books you purchase….

Sage N Clements on Insurance Requirements

A friend of mine ask me to be a guest host on their inaugural podcast to talk about Cyber Insurance and Information Security. I could not hesitate to help him out….

Cyber Security Awareness Month – Suspicious Emails

As you may know, October is Cyber Security Awareness month. Being an IT Security Professional, I wanted to use this month to provide a series of posts that provide tricks and tips on how to better protect yourself…

How I Studied And Passed The CISSP Exam in 2020

Everyone has heard the stories of how tough the Certified Information Systems Security Professional (CISSP) examination is. It’s been described as taxing, mind-blowing and hard to pass. In fact, in many tech circles,