What Is Symmetric Encryption? [VIDEO]

Symmetric Encryption is an algorithm that uses the same secret key to both encrypt and decrypt plaintext into ciphertext….

Escaping Traditional Cyber Security Awareness Training

One of the apparent challenges many have with today’s methods of learning is literally consuming the same material without flair or consequences. In hindsight, I can see where that would be an issue.

Hacker Attempts To Poison Florida Water Supply

Last week it was reported that a Florida metropolitan water plant was a victim of a cyber attack. The threat actor reportedly accessed the water plant’s supervisory control and data acquisition or SCADA…

Sage N Clements on Insurance Requirements

A friend of mine ask me to be a guest host on their inaugural podcast to talk about Cyber Insurance and Information Security. I could not hesitate to help him out….

Cyber Security Awareness Month – Suspicious Emails

As you may know, October is Cyber Security Awareness month. Being an IT Security Professional, I wanted to use this month to provide a series of posts that provide tricks and tips on how to better protect yourself…

How I Studied And Passed The CISSP Exam in 2020

Everyone has heard the stories of how tough the Certified Information Systems Security Professional (CISSP) examination is. It’s been described as taxing, mind-blowing and hard to pass. In fact, in many tech circles,

Sage Knows IT: The Case to Ban TikTok

The Case To Ban TikTok In 2020

In recent weeks, reports from the IT Security community have surfaced that a popular short-form video app, called Tiktok may be collecting excessive and potentially unusual user data. A user by the name of…

How to do Virtual Conferences The Right Way

Today marks the first time I have attended a virtual industry conference and I must say it’s bittersweet. On one end, I always find myself increasingly nervous when I attend these events in person…

Making Security Awareness Training Effective

The consensus among most security professionals is that either traditional training methods do not work or that company officers do not value the needs of such training. Although I do believe that both have merit, the latter of the two has improved in the last three years, primarily due to some high profile public breaches.

RSS302
Twitter638
YouTube0
YouTube
Pinterest0
fb-share-icon
LinkedIn
Share
20