Category: Cybersecurity
Fortinet Marketing
One of the coolest things I have experienced happened to me today. I was doing some research on the internet. I ran across marketing material from a major company I had never worked for before that used an article I had written for AT&T Cybersecurity.
DNS: Types of DNS Records, DNS Servers and DNS Query Types
DNS is a global system for translating IP addresses to human-readable domain names. When a user tries to access a web address like “example.com,” their web browser or application performs a DNS Query against a DNS server, supplying the hostname. The DNS server takes the hostname and resolves it into a numeric IP address to which the web browser can connect.
The Top 6 DNS Attack Vectors per ChatGPT
The Domain Name System (DNS) is a critical infrastructure that is used to translate domain names into IP addresses, and it plays a key role in the functioning of the internet. As such, DNS is a common target for cyber-attacks, and there are several different types of threat vectors that are commonly associated with it.
The 10 Domains of Cybersecurity
What, you might ask, are industries and domains within cybersecurity? Simply put, industries are groups of related companies based on their primary business activities. Fields are specified spheres of knowledge and action within a discipline. Why is it essential for those interested in a cybersecurity career to know the top industries and domains? Well, one reason is when you seek a cybersecurity job, it’s always good to know which industries are hiring the most professionals. Fields within cybersecurity are also crucial to know what knowledge is expected of you if you enter cybersecurity.
How Network Traffic Can Mask A Serious Cyber Threat
Our network is always moving. Data flows from place to place, between all the endpoints that require rapid internet access. But like any traffic, this data can become congested – and some of it can be dangerous. You never quite know what is hidden in your network traffic until it strikes your device with a […]
Can Cybersecurity be Automated?
Cybersecurity is time- and resource-intensive. The threat landscape continues to evolve, and security analysts are feeling burnt out. According to research, 54% of security operation center (SOC) teams say that they are drowning in alerts, and 55% are not confident that they can prioritize alerts or respond effectively. Effective cybersecurity requires organizations to have the people, […]
5 Common Indicators of a Phishing Attempt
Phishing is one of the most common and effective cybersecurity attack vectors, accounting for roughly a quarter of all ransomware attacks between 2019 and 2021, according to research from Cloudian.
5 questions every higher-ed security leader should ask
In the day and age of COVID-19, we have witnessed a transformation of the way we work. If I were asked before March of 2020 how long it would take to make the progress in digital and security transformation that we as a society have made in the last 9 months, I would have guessed at least 5 years.
- 1
- 2