cyber security degree

3 Leadership Books on Power

Power is a tricky topic. Fortunately there are some great leadership books to help us navigate the pitfalls. Here are three contemporary authors who deliver.… Read More »3 Leadership Books on Power

Tech Assimilation and Warehousing of Talent

The other day, I received a call from a state representative regarding the information posted on my web site. I was questioned about its content.… Read More »Tech Assimilation and Warehousing of Talent

Terrorism – A Threat to Global Peace

ABSTRACT Nowadays, no one seems to be saved in the world. Terrorism, an ugly development which has compelled the world leaders as well as the… Read More »Terrorism – A Threat to Global Peace

Can Blockchain Co-Exist With GDPR?

On May 25th, 2018 a new privacy law took effect in Europe. The GDPR or General Data Protection Regulation, and it gives EU citizens control… Read More »Can Blockchain Co-Exist With GDPR?

Penetration Testing Part 2

First of all thank you for reading the Penetration Testing Part 1, Lets start with Part2. Here I will show you how to conduct a… Read More »Penetration Testing Part 2

The Rise and Rise of Online Storage

When accessing the internet meant using a slow, dial-up connection, the idea of storing your data remotely rather than on a local disk was unthinkable.… Read More »The Rise and Rise of Online Storage

Is Your WoW Hacked?

Many people have been complaining about their WoW accounts being hacked. The problem mainly lies in the fact that hackers have been coming up with… Read More »Is Your WoW Hacked?

USB Flash Drives a Security Threat?

Progress in new technology, driven by the fall in Nand Flash price, has led to a number of small devices that can hold a significant… Read More »USB Flash Drives a Security Threat?

How to Pursue a Career in Ethical Hacking

Ethical hacking is the process of penetrating or intruding in a computer system for the purpose of security testing. Hackers who conduct ethical hacking are… Read More »How to Pursue a Career in Ethical Hacking

This Pandemic Is Tiresome

Are you looking for something to do at home? Or are you just sitting on the couch whining about being broke waiting for the lights… Read More »This Pandemic Is Tiresome

Risk Management and Cyber Security

The advent of the internet has opened endless avenues for development, but at the same time, cyber-theft has become much easier. With financing, personal and… Read More »Risk Management and Cyber Security