United States Cybersecurity Magazine

ProcessBolt

Cybersecurity Career

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Dark Lit Two Men Cybersecurity Career Engineer Lab

Cybersecurity is a growing threat. Last year, we saw 143 million Americans lost their personal, sensitive information in an Equifax data breach. This year, we saw Facebook allow our personal information to be mined by third party company without our consent or knowledge. In the year of 2016, the US. Bureau of Labor Statistics (BLS) claimed that … Read more

Why People are Ditching Social Media

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Hand unplugging, unplug, social media detox

The Pew Research Center has released a new report that tracks the relationship people have currently with social media. It has been six months since Facebook revealed that they were allowing user’s information to be harvested by Cambridge Analytica. According to the report released by Pew Research Center, the debacle has turned a lot of … Read more

Cybersecurity Services

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

hand holding cloud connected to apps, raining information, cybersecurity services

There are a lot of common issues that plague your digital devices. Traversing the internet is no simple task in 2018. For example, one in thirteen web requests lead to malware. It is incredible likely that your computer will get a virus at some point in your lifetime. That likelihood grows yearly. This is seen … Read more

What is a Firewall and How Does it Work?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cords plugging into a system firewall

Firewalls have essentially been around since the beginning of the internet. A firewall is a network device designed to protect your system by monitoring and controlling information traffic based on a preset list of rules to ensure security. Firewalls establish a barrier of protection between a trusted network and a foreign network. They are one … Read more

What is the Difference Between a White Hat Hacker and Black Hat Hacker?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Black Hat Hacker staring at computer screen wearing hoodie as the room is illuminated by green light. White Hat Hacker conceptual.

Movies are probably to blame for the majority of the public not understanding what a hacker actually does. We all conjure a very specific set of tropes in our brains whenever we hear about hacking. A man in a hoodie, typing late into the night as the green glow of binary code illuminates his Doritos-dust … Read more

What is a Honeypot?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

honeypot sitting on a brown paper on a table. Spoon in honey. Honey jar.

In 1986, systems administrator Clifford Stoll noticed nine seconds of unpaid computer time at the Lawrence Berkeley National Laboratory. Upon being asked to resolve this, Stoll eventually came to the conclusion that a hacker had illegally gained access to their network by exploiting a vulnerability. Stoll decided he would set up a trap for the hacker. He … Read more