top of page
Search


Multi-Factor Authentication (MFA) isn't Optional Anymore
In our world, where password leaks, default passwords, and easily guessable passwords run amok, multi-factor authentication (MFA) is a...

Chris Yarbrough
Feb 214 min read


Your Flipper Zero is Getting a Major Upgrade
Flipper Zero released its highly anticipated Firmware 1.0 with several major updates that have been in development for the past three years.

Chris Yarbrough
Sep 11, 20243 min read


A Quick Look at NIST 800-53
The National Institute of Standards and Technology (NIST) Special Publication 800-53 serves as a cornerstone for establishing robust...

Chris Yarbrough
Aug 1, 20243 min read


Laws and Regulations You Need to Know in Cybersecurity
Cybersecurity requires understanding legal and regulatory frameworks. These laws govern how organizations handle data, protect privacy,...

Chris Yarbrough
Jul 31, 20243 min read


Balancing the Risk of Remote Access
Remote access tools are an indispensable resource for IT teams managing geographically dispersed, hybrid workforces. These tools enable...

Chris Yarbrough
Jul 30, 20243 min read


Looking Back at MGM: What We've Learned and How to Make Your Organization More Resilient
The recent cyberattack on MGM Resorts International serves as a reminder of the vulnerabilities organizations face in today's digital...

Chris Yarbrough
Jul 29, 20243 min read


How To Stand Out When Applying For Cybersecurity Roles
If you’ve been tirelessly applying for cybersecurity roles and still aren’t landing the job, you’re not alone. Countless posts on...

Chris Yarbrough
Jul 23, 20243 min read


We Will Rock You?
On July 4th, 2024, the cybersecurity community was rocked (pun intended) by one of the largest password leaks ever recorded. Known as the...

Chris Yarbrough
Jul 8, 20243 min read


What Companies Need to Know About THM and HTB
In the competitive field of cybersecurity, traditional education, experience, and certifications have long been the gold standard for...

Chris Yarbrough
Jul 2, 20243 min read


The Superpower Every Cybersecurity Professional Needs
When you think of the skills needed to succeed in cybersecurity, you may think networking, risk-management, Linux, scripting,...

Chris Yarbrough
Jul 1, 20243 min read


A Quick Guide to IAM
Here’s everything you need to know to get you started on the path of learning IAM in order to protect your organization effectively.

Chris Yarbrough
Jul 1, 20243 min read


Why You Must Learn BASH to Advance in Cybersecurity
Learning BASH (Bourne Again Shell) scripting can enhance your skill set and cybersecurity career prospects. BASH is a powerful...

Chris Yarbrough
Jun 27, 20242 min read


The Best Cybersecurity Certification Under $50?
The Google Cybersecurity Professional Certificate is a surprisingly excellent stepping stone for aspiring cybersecurity professionals....

Chris Yarbrough
Jun 27, 20243 min read


MOVEit Transfer Critical Vulnerability - Now Exploited!
In June 2024, a critical (9.1 CVSS) security vulnerability in the MOVEit Transfer software was disclosed, sparking immediate concern in...

Chris Yarbrough
Jun 26, 20242 min read


Do You Know Who's Logging into Your Computer?
In cybersecurity, recognizing the different types of logins and understanding how to verify their legitimacy is crucial for maintaining a...

Chris Yarbrough
Jun 26, 20244 min read


Stop Using Passwords - Use This Instead!
Authentication mechanisms are critical in protecting sensitive information and preventing unauthorized access. Traditional authentication...

Chris Yarbrough
Jun 25, 20243 min read


Ignoring GRC Could Be the Biggest Mistake of Your Cybersecurity Career
In cybersecurity, it's easy to get lost in the technical aspects like firewalls, encryption, and penetration testing. However, if you're...

Chris Yarbrough
Jun 21, 20243 min read


XM Cyber Exposure Management Course and Certification Review
The XM Cyber Exposure Management Course and Certification is a great resource for anyone in the cybersecurity field.

Chris Yarbrough
Jun 20, 20242 min read


A Firewall Appliance Isn't Enough
In cybersecurity, achieving robust network traffic control and effective network segregation requires a multi-layered approach. Relying...

Chris Yarbrough
Jun 18, 20243 min read


Check Your Systems For This Suspicious Activity
Analyzing event logs is a critical step in identifying potential indicators of compromise (IoCs). Certain event IDs could be a sign of...

Chris Yarbrough
May 22, 20243 min read
Cybersecurity Blog: Blog2
bottom of page