Why U.S. Cyber Command is Reportedly Splitting From NSA

News that the United States Cyber Command is breaking off from the National Security Agency recently surfaced, with U.S. officials claiming the move as an effort to strengthen the country’s ability to conduct defensive and offensive cyber operations. According to various news sources, the goal of the reported separation is to make Cyber Command

By | 2017-07-27T19:33:45+00:00 July 27th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: |

The Breakdown: Protecting Yourself from Ransomware

Imagine this: you come home from work, turn the key and slowly walk into your house. As you step in, your jaw drops as you see the horrifying emptiness of your home. No furniture, no things, no trace of anything you once had. Your chest tightens. Your heart races. Your

By | 2017-07-21T15:11:34+00:00 July 20th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: , , |

Air Force ‘Bug Bounty’ Calls For Hackers to Expose Cybersecurity Holes

The U.S. Air Force has announced that it is launching a "bug bounty" challenge from May 30 to June 23, allowing hackers to scan for cybersecurity vulnerabilities on its public-facing websites in exchange for cash rewards. The challenge, billed as "Hack the Air Force," is open to cybersecurity specialists and "white hat" hackers from

CyberSquad, Assemble! 5 Key Roles In Your Cybersecurity Team 

Cue the CyberSquad signal! Cyber threats are the super villains with a mission to destroy your organization, and it takes special abilities to bring them down. When it comes to cybersecurity, you not only need a robust infrastructure, but also a competent talent force behind it—a superhero squad dedicated to defending your organization from the

By | 2017-06-07T19:49:47+00:00 April 11th, 2017|Categories: Cyber Operations and Training, Cyber Security|Tags: |

Ingredients for Cyber Dog Food [Video]

What is Cyber Dog Food? Cybersecurity is a watchdog that’s always on duty. As you may have read in our piece on Homeland Security Today, "you must be willing to apply the same standards to your company’s network as you would when making a recommendation to a client.” What are the ingredients of Cyber

By | 2017-05-02T16:34:44+00:00 October 25th, 2016|Categories: Cyber Operations and Training, Cyber Security|Tags: , |

Are You Password Protected? [Video]

Passwords: A Cheap Way to Improve Your Security Posture As a recently retired Naval Cyber Warrior, I come from a long line of salty and forward leaning communications and network security sea dog. My favorite sea dog was a Submarine Skipper who took over as the Battle Group N6 (meaning he owned all long

By | 2017-04-06T14:14:27+00:00 October 19th, 2016|Categories: Cyber Operations and Training, Cyber Security|Tags: , |