<img height="1" width="1" src="https://www.facebook.com/tr?id=205228923362421&amp;ev=PageView &amp;noscript=1">
  • 844-558-4782

CyberVista Blog

The Founding Generation on Cybersecurity

The Founding Generation on Cybersecurity Picking the Founders’ Brains The ghosts of the Founding Generation are especially active around Independence Day. And these spirits still have much to share, teach, and to pass on. The Founders had great foresight, so it’s a helpful exercise to look back at their thoughts [...]
Read More

Jun 29, 2017

0

Whaling: Scamming the Big Fish

Scamming the Big Fish An old type of cyberattack has gained newfound, high profile attention this month. Two finance Chief Executive Officers fell victim to an email hoax. Cybersecurity researchers have a name for this subtype of cyberattack: “whaling.” It’s an email phishing attack specifically targeting a [...]
Read More

Jun 27, 2017

0

Top 5 Pitfalls of CISSP Training

Top 5 Pitfalls of CISSP Training Congratulations are in order. You have recently made two excellent decisions. The first is that you have decided to earn your CISSP certification. The CISSP is a great investment that can help you distinguish yourself to current and potential employers in the security field. [...]
Read More

Jun 22, 2017

0

The Board’s Role in Cybersecurity

Exclusive Interview: The Board’s Role in Cybersecurity This post was originally published Equilar Inc. at the following URL: http://www.equilar.com/blogs/271-exclusive-interview-the-board-role-in-cybersecurity.html
Read More

Jun 15, 2017

0

Student Spotlight: Benjamin Collar, CISSP

Student Spotlight: Benjamin Collar, CISSP Welcome back to CyberVista’s Student Spotlight Series. In this series we talk to newly-minted CISSPs who used the CyberVista system to earn their cert. This episode we talked with Benjamin Collar, Manager of Cybersecurity Research Group in Corporate Technology at [...]
Read More

Jun 15, 2017

0

You Need a Data Privacy Officer.

You Need a Data Privacy Officer. Look for These Four Skills Polish the Job Requirements Privacy is about keeping secrets, but it is sure getting a lot of attention recently. At the center of that attention is a new, emerging role: the Data Protection Officer (DPO). Most notably, the recent GDPR regulation, [...]
Read More

Jun 13, 2017

0

Name That Domain: Top Secret NSA Leaks

This post is part of a series in which we pull security stories right from the headlines and discuss their relevance to the eight domains of the CISSP® exam.
Read More

Jun 8, 2017

0

Why Corporate Leaders Should Read China’s Five Year Plan

Welcome back to our series on the ties between corporate security and China’s Five Year Plan (FYP), a document that serves as the country’s national economic and policy roadmap. Because we understand the unique roles and responsibilities of executives and corporate leadership, we’re focused on cyber risk as an [...]
Read More

Jun 6, 2017

0

Student Spotlight: Gary Brown, CISSP

Welcome back to CyberVista’s Student Spotlight series. In this series we talk to newly-minted CISSPs who used the CyberVista system to earn their cert.
Read More

Jun 1, 2017

0