More political humor. Feel free to copy and use in Facebook posts. If you need more, check out my board on Pinterest.
AUG
More political humor. Feel free to copy and use in Facebook posts. If you need more, check out my board on Pinterest.
Original release date: August 19, 2020
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have identified a malware variant—referred to as BLINDINGCAN—used by North Korean actors.
Catch of the Day: Outlook Phishing
Chef’s Special: VPN Vishing
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to phish@wyzguys.com.
My intention is to provide a warning, examples of ...
Continue Reading →On Monday I started this two-part article on developing a career in Information Technology or Cybersecurity. This advice could apply to any technical field. In the first part, started out covering the basics, and if you missed that part you might want to check out Monday’s post before continuing.
That said, looking back on my career, I see the different stages that are a great career progression ...
Continue Reading →As it happens I have had a wonderful 20 year career in Information technology and cybersecurity, and the career continues with new adventures. While thinking about my IT career, I came to see it as a succession of steps.
For people just starting an IT or cybersecurity career, especially students in high school and college, your teachers and professors will place a lot of emphasis on planning your career and work ...
Continue Reading →As we pull into the Silly Season, where we choose the future leaders of our country from a pack of liars, I am dedicating Sunday Funnies to lampooning the process through sarcasm and satire. Let’s try to remember that sarcasm and satire are honored parts of the comedy profession. I know these days we are ready to be offended by anything, and ready to attack. Please resist that urge. I hope you enjoy some of these panels. A lot of ...
Continue Reading →Dr. David Brumley, a professor at Carnegie Mellon University and CEO of ForAllSecure, explains what DevSecOps is and how companies can use it to improve application security by designing security in from the start. Read interview…
Catch of the Day: RingCentral Voicemail Phish
Chef’s Special: KONNI Malware Phish
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to phish@wyzguys.com.
My intention is to provide a warning, ...
Continue Reading →One of the Facebook cybersecurity groups that I follow, Cybersecurity Lounge, is set up to provide ideas and advice to people at the start of their IT career, or who are studying for, or have just passed, a certification. One member of the group told a story of a recent interview he had for an IT job. He was first ...
Continue Reading →As you are studying for the CISSP, CASP+, or Security+, you will come across these two important NIST frameworks. They seem the same, but they are not.
If you are deploying one or both of these frameworks in your organization, understanding the difference between them is even more important.
Today we are republishing an article by Rick Tracy. Rick Tracy is the senior vice ...
Continue Reading →