Candidate
Wanna Cry? Updating your systems is crucial!
When hacking exploits had been leaked from the NSA last month, it offered a hacking toolkit to anyone in the world who wished to try to use them. The companies responsible for the effected programs, such as Microsoft, had immediately scrambled to update – or had, in fact, already provided updates – to defend against these…
Read MoreThe Race for Security: Zero Day Exploits
Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day exploits have been buzzing in the news in the wake of the Wikileaks concerns, where a number of such exploits had been posted where any who were interested could learn illegally about how to use them. Many are worried about…
Read MoreThe Tax Clock is Ticking
Phishing Scams Thrive on Deadlines and Fear Tax returns are soon due on Tuesday, April 18th, 2017, and with that looming deadline, the pressure is on to have everything done and filed correctly. All paperwork in order? All taxes accounted for? Employees all have their W-2s? It is a pressure that phishing scammers thrive upon.…
Read MoreCybersecurity in the New Administration
2016 has been a year, to say the least. With the loss of legends like David Bowie, Prince, Alan Rickman and Mohammad Alli, and of course a tumultuous presidential election leaving much of the nation divided, we’re just about ready to put this year to bed. However, we still have the better half of December…
Read MoreDo You Want to Work in Infosec or Win a Nobel Prize for Literature?
Is This a Resume or a Novel? 5 InfoSec Resume Tips I’ve come to the realization that we have many budding writers masquerading as Information Security professionals out there. Today, my InfoSec staffing company received a fifty-five page resume from a candidate. I’m not joking – 55 pages! In eighteen years of recruiting, this is…
Read MoreCybersecurity is Not Up for Debate
Taking a Look at Cybersecurity’s Future in Legislation With the presidential debates behind us, and the election day looming, the issue of cybersecurity still remains largely untouched. While a passing topic at some point in each of the debates, the only direct question ever addressing the issue was from the first debate. Moderator Lester Holt…
Read MoreRecruiters getting spammed!
I know what some of you are thinking, how do you like it now the shoe is on the other foot? Well I don’t but not only because I don’t like being spammed…. I mean who does? More because some of the stuff I get is the exact reason why all recruiters get tarred with…
Read MoreIT Phone Home
The Challenge of Connecting Mobile Apps to IoT Devices in Homes A challenge for home automation developers is how can something sitting in your home network, which is presumably on a private network behind a firewall hidden from hackers, be readily available to a mobile app which could be potentially anywhere in the world. When you receive the little…
Read MoreSomeone’s Hacked My Toaster!
IoT Security Hysteria & Some Development Tips to Avoid Being Called Out at Defcon Being in the fairly uncommon position of founding both security and mobile app development companies, I get to play poacher and gamekeeper on a daily basis. For my American friends, that’s offense and defense! I wanted to add a little value from…
Read MoreKickstart your Career in InfoSec with the Peerlyst Guide
Cyber security is one of the fastest growing job markets in the world today, though newcomers can find breaking into the field a difficult feat. Yet, with Forbes reporting a growth of over $90 billion in the next four years, there seems to be no time like the present to make a career switch. Thanks to…
Read More