<img height="1" width="1" src="https://www.facebook.com/tr?id=205228923362421&amp;ev=PageView &amp;noscript=1">
  • 844-558-4782

CyberVista Blog

Critical Infrastructure Targeted

Critical Infrastructure Targeted It would be must-see TV if it wasn’t happening in real-life ­– or if your TV could even be turned on. It’s a hack of the U.S. power grid. Intruders have gained hands-on control of critical infrastructure electrical operations along the East Coast and have induced a blackout from [...]
Read More

Oct 31, 2017

0

Wi-Fi Security Protocol WPA2 Suffers Its First Loss

Wi-Fi Security Protocol WPA2 Suffers Its First Loss After a 13-year reign as the optimal method to secure communications over a Wi-Fi connection, the encryption scheme WPA2 (Wi-Fi Protected Access II) was cracked last week. Security researchers discovered a vulnerability that can be exploited using KRACK or Key [...]
Read More

Oct 26, 2017

0

The Future of Enterprise IoT

The Future of Enterprise IoT IoT Gaining Steam The Internet of Things (IoT) continues to gain tremendous momentum. That’s because IoT devices make life and business easier. IoT physical devices and other items embedded with electronics, software, sensors, actuators, and network connectivity which enable these [...]
Read More

Oct 24, 2017

0

Instructor Spotlight: Troy McMillan

Instructor Spotlight - Troy McMillan Welcome to the first post in CyberVista’s new Instructor Spotlight Series. In this series, we share interviews of our certified instructors who teach our courses to current and aspiring cybersecurity practitioners. In this episode, we connect with Troy McMillan, Content [...]
Read More

Oct 19, 2017

0

CISSP: The Switch to CAT

CISSP: The Switch to CAT I don’t have any cats. In fact, I’m allergic. But I do have a lot of experience with CATs. And this type of CAT is much more friendly to my immune system: Computer Adaptive Test. (ISC)² is converting CISSP into CAT according to a recent presentation of the organization's CEO, David [...]
Read More

Oct 17, 2017

0

The Top 5 Mistakes Companies Make in Cyber Crisis Communications

The Top 5 Mistakes Companies Make in Cyber Crisis Communications (And How to Avoid Them) By Siobhan Gorman, Director, Brunswick Group Experiencing a breach may not damage your company, but managing it badly in the public spotlight almost certainly will. The casualty list for mismanaged breaches continues to grow, [...]
Read More

Oct 17, 2017

0

Studying for the Sec+ Exam? Use What You Know

Studying for the Sec+ Exam? Use What You Know The Power of Analogies As the cybersecurity workforce gap widens, the prospect of a career in cybersecurity becomes sweeter and sweeter. Given the tremendous growth of the cybersecurity industry, the field will undoubtedly see newcomers, or those without a security/IT [...]
Read More

Oct 12, 2017

0

CISO Top 5 Tips to Meaningful C-Suite Engagement

CISO Top 5 Tips to Meaningful C-Suite Engagement The relationship between CISOs and the C-Suite continues to evolve.  While some CISOs have earned a seat at the leadership table, many InfoSec leaders still need to prove their value even though cyber risk may be the greatest risk facing an organization.
Read More

Oct 10, 2017

0

Why Millennials Should Take Up The Cyber Cause

Why Millenials Should Take Up The Cyber Cause Why Aren’t They Interested? At the end of each academic year, middle schoolers move on to high school, high schoolers start college, and college undergrads begin looking to enter America’s workforce.  The cybersecurity industry has plenty of room to house many of [...]
Read More

Oct 5, 2017

0

Prepare Your Business for the Inevitable Cascade of Cybersecurity Legislation

Prepare Your Business for the Inevitable Cascade of Cybersecurity Legislation It started with the enactment of the GDPR. Then New York’s Department of Financial Services put out 23 NYCRR 500. Most recently Colorado’s Division of Securities adopted final cybersecurity rules under the Colorado Securities Act. Even [...]
Read More

Oct 3, 2017

0