hh-rsvp-banner

Hacker Halted 2016 Teaser

The theme for Hacker Halted in 2016 was the Cyber Butterfly Effect: When Small Mistakes Lead to Big Disasters. The goal of the conference is to bring the IT security community together to discuss how organizations are often compromised through the smallest of mistakes and how implementing effective changes can have ripple effects throughout all…

most-in-most-in-demand-tech-skills-for-2016

Most In-Demand Tech Skills for 2016

Get to studying! Here are the most in-demand and highest paying technology skills and certification of 2016 from Dice.com and Robert Half Technology. Dice.com has a report from the Robert Half Technology company of the most in-demand technology skills and certifications for 2016. Over 2,000 chief information officers in the U.S. were surveyed for the…

eccu

EC-Council’s Certified CISO (CCISO) Program Breaks Records

EC-Council’s executive-level certification program for information security managers broke the company’s record for the largest Certified CISO (CCISO) class to date with 35 students in the Atlanta, GA class prior to the Global CISO Forum conference. ATLANTA, GA (PRWEB) SEPTEMBER 23, 2016 EC-Council, creator of the Certified Ethical Hacker (CEH) program, has seen the popularity…

Saving the Business World from Cyber Attacks

Those who ponder a career in the cyber security jobs market may be boxed into an idea of working in a government or federal institution securing networks and writing up plans for disaster recovery. However, individuals interested in cyber security degrees should take a look at the plethora of industries that require degreed and/or certified…

Solving the Ransomware Cyber Attack Epidemic

A recent report on CIO Dive written by Justine Brown (2016) states: “Ransomware is now the most prolific cyber threat of 2016. Security experts identified 14% more new ransomware malware modifications between January and March this year compared to the same period last year.” In another recent CIO Dive article, “University Pays $16K to Unlock…

ECCU

Cyber Extortion: Traditional Blackmail with a Cyber Twist

Ransom, extortion or blackmail, regardless of the name, hackers are breaking into network systems encrypting the data and holding it hostage. These age-old activities are being married to modern technology and wreaking havoc. They have become one of the fastest-growing technologies in cyber crime. Whether you are in retail, manufacturing, the hospitality sector, or an…