United States Cybersecurity Magazine

ProcessBolt

The Untold History of Women in Cybersecurity

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

The Untold History of Women in Cybersecurity

In the past, women’s role in the tech industry has been underrepresented, however, women have long been active in information security.  Their contributions are often overlooked and under-appreciated. Perhaps because women’s stories aren’t told as often as men.  Many cybersecurity professionals are unaware that women have been shaping and protecting our data for decades.  Despite … Read more

How to Reduce Human Error in Cybersecurity with Red Teaming

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

Red Teaming - Cognitive Bias

Human error in cybersecurity evokes images of untrained employees logging into systems with weak passwords used for multiple accounts or clicking on phishing emails. However, mistakes can come from the most experienced members of your IT and security team – professionals who know more about cybersecurity than anyone else in your company. As they progress … Read more

How to Tell if Your Wireless Router Has Been Hacked

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

How to Tell if Your Wireless Router Has Been Hacked

Routers are hardware devices used by ISPs (Internet Service Providers) to connect their customers to their xDSL or cable internet network. Wi-Fi routers or wireless routers combine wireless access points, networking functions, and a router. In essence, routers connect local networks to the internet or other local networks; thus, wireless access points connect devices to … Read more

Insider Attacks: How Prepared Are You?

Author(s):

Karthika Surendran, Product Marketer, ManageEngine

Insider Attacks

Insider attacks often catch organizations by surprise because they’re tricky to spot. Banking on reactive solutions like antivirus software or a patch management solution to stay abreast of such attacks is not very wise. Understanding what exactly contributes to the increasing number of insider threats and addressing these factors is the only way to secure … Read more

Comparing the Cybersecurity Methods Between Private Accountants and Accounting Services

Author(s):

Frankie Wallace, ,

Cybersecurity and Accounting

Financial technology (Fintech) is the lifeblood of accountants these days. Whether accountants work for private clients or operate services for larger firms on a public level, they need the tools, software, and technology for accurately and quickly tracking finances and auditing systems. But now, facing a digital landscape plagued by more cybersecurity threats than ever … Read more

The Worst DDoS Attacks in Recent History and How to Protect Your Business from Them

Author(s):

John Black, Senior Content Writer, Globex IT Solutions

DDoS Attacks - WAF

There has been an alarming increase in DDoS (Distributed Denial of Service) attacks in the last year. The majority of businesses in various industries along with their different processes have no choice but to shift online to ensure business continuity. There was sudden transfer to remote operations and telecommuting, which logically meant more access to … Read more

,

Securing Endpoints: The Gateways to Your Enterprise

Author(s):

Nikhil Narayan, Product Marketer, ManageEngine

Securing Endpoints - Network

Endpoints across an IT network lay the foundation of every modern-day enterprise.  These endpoints, comprising of laptops, desktops, and mobile devices that connect to the business’s network are seen by malicious actors as potential gateways for data breaches and malware intrusions. According to a study released by Quantitative, the average cost of a data breach … Read more

Cybersecurity Acronyms – A Practical Glossary

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Cybersecurity Acronyms

Whether you are a cybersecurity professional, an end-user, just starting in cybersecurity or interested in the field, this cybersecurity acronym practical glossary is for everyone. Cybersecurity acronyms can be confusing, especially with some acronyms having dual meanings – think IP address and IP for Intellectual Property – and some acronyms having very slight differences. Here, … Read more

,

How to Become a SOC Analyst

Author(s):

Glenn Mabry, Senior Instructor/Security Researcher, Advanced Security

How to Become a SOC Analyst

A Security Operations Center, or SOC, is one of the most important departments for any modern business. It is here that the organization’s cybersecurity team does their job, monitoring and analyzing their security networks in case of bad actors or other cyber-attacks. Working in a SOC can be extremely exciting, but the journey to that … Read more

Problems With Anti-Virus Software and Alternative Solutions

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Anti-Virus Software, Hand holding magnifying glass to computer, virus detected

Anti-Virus software is the layman’s solution to cybersecurity. Functioning as a first line of defense, Anti-Virus software works to prevent, detect, and remove malware from your computer. However, Anti-Virus software is not a cure all solution. In fact, IMB Knowledge Center published a piece on the limitations of Anti-Virus protection. In the article, they cite … Read more