Sunday Funnies – Explaining Politics

As we pull into the Silly Season, where we choose the future leaders of our country from a pack of liars, I am dedicating Sunday Funnies to lampooning the process through sarcasm and satire.  Let’s try to remember that sarcasm and satire are honored parts of the comedy profession.  I know these days we are ready to be offended by anything, and ready to attack.  Please resist that urge.  I hope you enjoy some of these panels.  A lot of ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


DevSecOps tutorial: What is it, and how can it improve application security?

Dr. David Brumley, a professor at Carnegie Mellon University and CEO of ForAllSecure, explains what DevSecOps is and how companies can use it to improve application security by designing security in from the start.  Read interview…


Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  RingCentral Voicemail Phish

Chef’s Special:  KONNI Malware Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, ...

Continue Reading →
0

Guest Post – A Tale of Two Frameworks: The NIST CSF and NIST RMF Are Not the Same

As you are studying for the CISSP, CASP+, or Security+, you will come across these two important NIST frameworks.  They seem the same, but they are not.

If you are deploying one or both of these frameworks in your organization, understanding the difference between them is even more important.

Today we are republishing an article by Rick Tracy.  Rick Tracy is the senior vice ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Porn blast disrupts bail hearing of alleged Twitter hacker

An alleged hacker’s bail hearing held online via Zoom with screen sharing enabled… what could possibly go wrong?  Well, damn near everything as it turns out.  Maybe IT needs to help these judges learn how Zoom works?


Top 5 Questions About Ransomware and ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Ionos Email Credentials Phish

Chef’s Special:  Zoom Meeting Phishing Attacks

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide ...

Continue Reading →
0

Learning How to Install, Configure, Maintain, and Repair a Computer

Today I am continuing the thread I started last week about breaking into information technology and cybersecurity as a career.  Let’s begin at the beginning.  No matter where you end up in your career, you can expect to start in an entry level position in a repair center, help desk, or desk side support team.  To be qualified for this position you need to know how to install, configure, maintain, and ...

Continue Reading →
0

How to Get Experience

One of the persistent questions I am asked, as an instructor, is a variation of:   “Every job I apply for wants experience, how do I get experience without a job?”  The flip side of that question comes from IT managers, and sounds like:  “We see too many candidates with computer degrees that lack any hands on computer experience or working knowledge of computers or networking.”

The problem is most college degree ...

Continue Reading →
0
Page 84 of 273 «...6070808283848586...»