Don't second guess. Go with experience.




Apprenticeships Assume Important Role in the Future of Cybersecurity

There are many industries and job roles that have been completely transformed in recent years thanks to the digital era; however, cybersecurity rises to the top of industries that have seen the largest number of changes. New technologies introduce new attack vectors at the same time the transition to digital everything creates more incentives for…

Read More
Email Phishing is a common attack vector.

The Attack Vectors to Know – Video Blog

When it comes to intelligence topics, a subject that people often hear about is attack vectors. Yet, attack vector is such a broad cybersecurity industry term. Most people may not really know what it means, and more importantly, what it means to them and why they need to be aware of the different types of…

Read More
Pattern Recognition

Pattern Recognition, Analysis and Profiling for Investigations and Threat Hunting

We’ve received a few questions about what we cover in our Pattern Recognition, Analysis and Profiling class. If you are a cyber investigator or analyst – or any role that requires you to extract meaningful information for threat hunting or investigative activities – understanding how to efficiently and effectively identify patterns in huge volumes of data and…

Read More
Photo by Helloquence on Unsplash

Expanding Your Election Security Knowledge

Election security is more than understanding the technology, which on its own can be complex and at times confusing; it also includes understanding how to do things securely at every step of the election process. Many of the concerns during the Midterm Elections were amplified by the atmosphere of uncertainty around potential threats, confusion over…

Read More
Questions to Raise Cybersecurity Awareness

Keeping Election Security News In Perspective

Very few would argue that recent headlines concerning election security haven’t been alarming. From hacking to voting systems to stolen voter registration data and the deliberate distribution of false candidate information, it’s no wonder people are questioning the integrity of election results. It’s hard to know who or what to believe, and while there is…

Read More
Incident Response Plan

Incident Response Planning: Facing the Nightmare to Avoid Real-Life Horror

It’s Halloween, a time to turn our attention to the things that terrify us. In honor of this tradition, consider this creepy scenario: Lifeless eyes dilate at your approach. Battery-operated lungs suck in stale air, hypnotically wheezing with inhuman rhythm. A plastic chest rises and falls. The smooth skin reminds you of your own, only…

Read More
Man checking cyber security on laptop

What is a Firewall and Why Do You Need One?

You may have heard of firewalls and how they are an essential part of your computer and network cybersecurity strategy. In this post, we describe what a firewall is, why they are essential for cybersecurity, and how to set up and maintain your firewall security system. What is a Firewall? A firewall is a device…

Read More

Election Security: Detection and Response

One if by Land, Two if by Sea…Three if by Cyber? What would’ve happened if on that fateful night of Paul Revere’s Ride no one saw the lanterns, or if the watchers completely missed the movement of the British troops? While our Nation’s federal and local officials balance providing insights on cyberthreat activities while assuring…

Read More

The Election Security Conversation: Hype or Headlines?

You’ve likely seen the media coverage describing the current state of election security, and if you only read the headlines the news isn’t good. From coverage of teenagers hacking election databases in ten minutes at DefCon Voting Village  to hackers’ ability to easily manipulate votes on voting machines, the headlines paint a bleak picture. On…

Read More

7 Rules of Cybersecurity Threat Hunting

Threat hunting can and should be a part of your cybersecurity efforts, but the idea of starting a threat hunting and monitoring program can be intimidating. Building a portfolio of threats to watch and determining how to manage the risks they pose to your organization is usually confusing, often misleading and just as often stressful….

Read More

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.