Archive for 57828255

Make Sure You Delete All Data from Unused Phones, Tablets, Laptops, or Computers

https://www.cyberscoop.com/erase-personal-data-old-computers-rapid-7/

How PayPal is Being Used for Phishing Scams

https://www.tripwire.com/state-of-security/vulnerability-management/understanding-vulnerability-scoring-risk/#.XJDgpJo5cqw.twitter

Understanding Vulnerability Scoring and How to Differentiate Vulnerability From Risk

https://www.tripwire.com/state-of-security/vulnerability-management/understanding-vulnerability-scoring-risk/#.XJDgpJo5cqw.twitter

Business Email Compromise Attacks are Moving to Mobile Devices

https://www.bleepingcomputer.com/news/security/business-email-compromise-bec-attacks-moving-to-mobile/

Extending Wireless Networking to Cars Creates New Cyber Risks

https://dataconnectors.com/technews/locking-more-than-the-doors-as-cars-become-computers-on-wheels/

UT Dallas Cybersecurity 2019 Kickoff Event

UTD Cybersecurity Invite

Many thanks to UT Dallas for inviting me to speak at their 2019 Cybersecurity Kickoff event. Graduates from cybersecurity programs like UTD’s are helping to close the skills gap, which is expected to reach 3.5M open positions by 2021.

Cyber Attack Trends in 2018

Cyber attack trends in 2018

The Top 10 Most Common Types of Cyber Attacks

The Top 10 Most Common Types of Cyber Attacks

What is Blockchain? A Step by Step Guide for Beginners

A step by step guide to blockchain

5 Important Healthcare Cloud Security Factors to Weigh

5 Important Healthcare Cloud Security Factors to Weigh