Blog

Partner summit  scaled

Uncategorized

7 Aug 2019

CompTIA Partner Summit 2019

CompTIA is preparing the IT industry for transformation of tech talent to fill the IT skills gap. The CompTIA Partner Summit is an event for CompTIA partners such as academic educators, commercial trainers, government agencies, corporate learning leaders and instructors. The event provides partners with the opportunity to learn new skills, engage in face-to-face communications and build new contacts with other CompTIA partners. The main goal is to drive businesses and the IT workforce forward.
Fingerprint

Uncategorized

18 Jun 2019

NSA + CISA warn Microsoft users to update and patch devices

A few weeks ago, the NSA published an advisory urging Microsoft Windows admins and users to patch and update systems because of a growing threat.
Cybersecurity computer screen

Uncategorized

10 Jun 2019

The importance of early cybersecurity training – Part 2

In our previous post, we talked about why there is a need for more cybersecurity professionals, and we mentioned that there are cybersecurity camps for teenagers. These camps are helping younger audiences get involved in cybersecurity.
Teenagers

Uncategorized

23 Apr 2019

The importance of early cybersecurity training – Part 1

As we all know, the cybersecurity threat landscape is changing on a daily basis. The need for finding highly trained individuals trained in this area is quite high, but given this huge demand, there is actually a severe shortage of workers in the cybersecurity industry. 
team training

Uncategorized

12 Apr 2019

How to become a cybersecurity consultant

The most common job title that is also very closely tied to the cybersecurity consultant is the information security consultant.  There are other, not as commonly used job titles which still refer to being a cybersecurity consultant:
architecture

Uncategorized

9 Apr 2019

VMware reinventing itself

NetworkWorld posted an article about VMware continuing to reinvent itself.  Neal Weinberg writes about the dilemmas VMware is facing and what it is doing to face those dilemmas head on.
Avoiding Cyber Attack

Uncategorized

28 Mar 2019

The importance of cybersecurity consultants

As we approach the end of the first quarter of 2019, many cybersecurity professionals are trying to predict what new threats could emerge in the remainder of the year.  Many believe that phishing will still remain the top threat vector out there, but its growing levels of sophistication and covertness will greatly expand as the year goes on.  It's becoming much more difficult to tell the difference between a spoofed and an authentic website.
Email background

Uncategorized

25 Feb 2019

Cybersecurity training: An increasingly valuable investment

Cybersecurity Ventures, the world’s leading researcher and publisher covering the global cyber economy, reports that cybercrime will more than triple the number of job openings over the next five years, and there will be 3.5 million cybersecurity job openings by 2021. 
Cloud course

Uncategorized

6 Nov 2018

The three types of cloud platforms

Our last post examined the top five advantages of using the Cloud, and what it means to your business as well as bottom line. In this blog, we review three various Cloud Deployment Models:

Uncategorized

9 Oct 2018

Scammers Are Getting More Clever

Many people think they are exempt from being scammed; however, that is not the case! Scammers are becoming more and more clever in their schemes, and we all need to become more aware of these hurtful practices. No one is safe when it comes to falling victim to scams. Krebs on Security discusses how many industry professionals are getting tricked by scammers through phone calls in his blog titled “Voice Phishing Scams Are Getting More Clever.”
Virtualization

Uncategorized

26 Sep 2018

A new introduction to virtualization course

The IT Infrastructure, as we know it today, is quickly moving away from being an “On Premises” model to a Cloud-based model.  The benefits of the Cloud are obvious, such as fixed and affordable pricing, scalability, on demand products and services, etc.  A critical component of any Cloud platform is that of “Virtualization.”
Cyber Crime

Uncategorized

20 Aug 2018

An FBI warning on ATM cashout attack

Brian Krebs, on his blog Krebs on Security,  shares a warning to all consumers; the FBI has warned banks of an “unlimited operation” run by cyber criminals.