Three Tips to Approaching Entry Level Cybersecurity Jobs

Did you know that a job advertisement is a request for interest? Did you also know that the potential employer has specific things they are looking for in an ideal candidate?  As a new entrant in the cyber industry, how can you confidently satisfy these requirements?  Over the weekend, I hosted a webinar where I invited my friend Priscilla…

Read more

The Exciting Role of Artificial Intelligence (AI) in Cybersecurity

So, the other day, my gym buddy and I were having a discussion on gaining muscle mass and he mentioned using ChatGPT for dietary and nutrition counsel. This struck me as a classic example of the broad use and quick adaptation of Artificial Intelligence (AI) in our everyday lives.  It took X (formerly Twitter) 2 years and Instagram 2.5…

Read more

How the Dark Web Affects You

Did you know that there are various aspects of the internet you interact with daily? You most likely use the “safe” and visible part of the internet for web browsing, accessing email and social media. How about other parts of the internet you hardly interact with? It may hold valuable information about you and have it on sale at…

Read more

Accessing Cyber Opportunities in Industrial Control Systems

Have you stopped to consider the things around you and how they operate? The things that get you from here to there and those things that help meet our daily needs. Consider the equipment used in the manufacturing industry like food and beverage production, and critical infrastructure such as power generation, and transportation. How will any form of cyber-attacks…

Read more

Top Three Proven Open-Source Cybersecurity Tools To Try Out

In the article for the month of April, How to gain valuable experience before your first cybersecurity role, I outlined helpful ways to gain hands-on experience before landing your first cybersecurity role. One of these excellent ways is to build your personal projects. But how can this be achieved with ease?. Is there a cost effective approach to implementing…

Read more

The proven importance and challenges of cloud computing

Every organization today is using some form of cloud. As an individual, you are using some form of cloud computing service be it email, document storage or teamwork tool. This service allows us to do business using technology and resources provided by another entity at a fee or at a heavily reduced price. It’s Value The IT landscape has…

Read more

Overcoming the unique challenges of securing the cloud

This month’s article is a follow up on my previous article, the proven importance and challenges of cloud computing, which touched on the benefits of cloud computing and a few cybersecurity challenges. This month we take a deeper look at the challenges faced by cyber professionals in our quest to secure the cloud and how to effectively overcome them….

Read more

How to gain valuable experience before your first cybersecurity role

As a student, career changer or incoming professional, having the needed skill and experience is a must to get most jobs, no exceptions. Listed below are a few helpful ways to gain the necessary skills to land your first cybersecurity role. Let’s begin. Recognize what you have learnt. Now, if you have taken time to learn and reliably obtained…

Read more

Top three sensational reasons to consider a career in Cybersecurity

Do you know that Cybersecurity professionals consider problem-solving abilities to be the most important qualifying characteristic for themselves (45%), closely followed by curiosity/eagerness to learn (39%), and communication skills (38%)? You may be more suited to this industry than you think. By the end of this article, you will have enough reason to give this career choice a second…

Read more

Microsoft announces deprecation of 1024-bit RSA keys in Windows

Microsoft has announced that RSA keys shorter than 2048 bits will soon be deprecated in Windows Transport Layer Security (TLS) to provide increased security. Rivest–Shamir–Adleman (RSA) is an asymmetric cryptography system that uses pairs of public and private keys to encrypt data, with the strength directly related to the length of the key. The longer these keys, the harder they…

Read more