Select Page

Blog

Feedback on Cybersecurity

Data Breaches and Credit Monitoring

This week's cyber news was that of the casinos getting breached. It funny, if I took advantage of all those credit monitoring services I was offered when my data was breached, my social security number would be in even more organizations databases. More opportunity...

Now What? NIST!

It's been a couple weeks since I passed the CEH. So now what? Well, I've revisited my Kali-Linux VM afterwards and tested some of my ethical hacker skills from a certified CEH point of view. I know a little more about NMAP, Nessus, and other Kali features. I also use...

Passed the CEH Yesterday

It took me about 4 months. Maybe longer than I expected. I did learn a lot. Would say it complements my CISSP. Now what? I'm going to concentrate on CyberZolutions now. This is a "side hustle" with a goal of someday going full time as my life and career transform....

Certified Ethical Hacker Certification Update

I finally completed the training course about a week ago. Took longer than I expected, but I'm really trying to learn the material. It would be obvious that I should know al ot of this material already with the experience I already have along with the studying for...

Update: Studying

A long time ago, before I really collected all my professional certifications, I purchased the Certified Ethical Hacker (CEH) Study Guide. I probably devoted a month or so to it. I then decided it was in my best interest to go a different path. So I opted for the path...

Physical Tokens for 2FA

I have written before about 2FA/MFA. This article in the Wall Street Journal provides a good 2 or so minute read on one the more popular keys around - The Yubikey and others. The Strongest Protection for Your Online Accounts? This Little Key - WSJ I can write all day...

Recent Wall Street Journal Article

The Wall street Journal and other news periodicals have published articles lately about how some bad guys are stealing and accessing victims' phones, and thus, personal details including and financial applications. I won't go deep (just read the articles), but I think...

Segregating Your Resources

Segregating your network or your crown jewels is very good protection strategy. This can be performed in so many ways. On a simple scale on a personal level, you can keep your sensitive files on a removeable encrypted hard drive. When you do not require the data, you...