<img height="1" width="1" src="https://www.facebook.com/tr?id=205228923362421&amp;ev=PageView &amp;noscript=1">
  • 844-558-4782

CyberVista Blog

How I Passed Security+ With Help From CyberVista

Building a Technical Foundation Though I work at CyberVista, most of my work is focused on topics related to cyber risk at the executive level – not practitioner-level technical content. Yet, I was encouraged by my CyberVista comrades to take advantage of the Security+ On-Demand course to earn my certification. [...]
Read More

Sep 20, 2018

0

The Differences Between CEH v9 and v10

Onto the Next One The Certified Ethical Hacker (CEH) certification has become a pervasive staple in cybersecurity and in penetration testing since it’s debut through EC-Council in 2003. Fifteen years and over 200,000 certifications later, the CEH certification released it ninth content curriculum update to create [...]
Read More

Sep 13, 2018

1

No Thank You Very Much, Mr. Roboto

No Thank You Very Much, Mr. Roboto Spammer and Robocall Tactics Even Practitioners Fall For Tell me if this sounds familiar: your phone rings unexpectedly and it’s an unknown number from the same area code as your personal number. You debate whether to answer knowing it’s probably a scammer, but curiosity kicks [...]
Read More

Aug 23, 2018

1

Why Your Best Cyber Talent is Going to Leave You

Why Your Best Cyber Talent is Going to Leave You According to a 2017 survey by ISSA and ESG, nearly half (49%) of cybersecurity practitioners are solicited for a job opportunity at least once a week. Stretching that out to a monthly range, almost every cybersecurity employee is presented with at least one [...]
Read More

Aug 16, 2018

0

Student Spotlight: Kathleen Rooney

Student Spotlight: Kathleen Rooney Welcome back to CyberVista’s Student Spotlight Series. In this series we talk with InfoSec professionals who used the CyberVista system. This episode we talked with Community and Communications Lead, Kathleen Rooney, of QTNA fame. The following interview has been edited for [...]
Read More

Jul 19, 2018

0

This Week in Cyber History

This Week in Cyber Cybersecurity is a nascent field, but it still has significant anniversaries. Welcome to the latest installment of This Week in Cyber where we look back on major events that have impacted information technology and cybersecurity. This is more than just an historical exercise. Looking back at [...]
Read More

Jul 12, 2018

0

The Founding Generation on Cybersecurity

The Founding Generation on Cybersecurity Picking the Founders’ Brains The ghosts of the Founding Generation are especially active around Independence Day. And these spirits still have much to share, teach, and pass on. The Founders had great foresight, so we can depend on their thoughts, writings, and actions to [...]
Read More

Jul 3, 2018

0

When Hackers Come Knocking: Protecting Corporate Networks When Working from Home

When Hackers Come Knocking: Protecting Corporate Networks When Working from Home With the rapid increase of remote workers, many employers have a remote or telework policy. There are enormous benefits to allowing employees to work remotely, either from home or while on the road, but telework can open your company [...]
Read More

Jun 21, 2018

0

The Power of Learning Science

The Power of Learning Science How do people learn best? What are the best ways to teach? How do we test for, and ensure, content mastery? These are the questions we tackle every day when we create and deliver our cybersecurity training courses. Learning science is in our DNA and we want to ensure that our [...]
Read More

Jun 14, 2018

0

WannaCry: The Evolution & Sophistication of Cyber Warfare

WannaCry: The Evolution & Sophistication of Cyber Warfare On May 12, 2017, a very sophisticated malware attack impacted over 200,000 computer systems spanning 150 countries across the globe. For many organizations, the impact of the WannaCry ransomware attack proved to be low. However, organizations such as [...]
Read More

Jun 4, 2018

0