In this article, we’ll walk through what firewalls do and the common types of firewalls. What is a Firewall? A firewall is a tool designed to intercept and assess incoming and outgoing packets. Depending…
Authentication is the verification of who you are and Authorization is the verification of what you have the right to do. When it comes to securing systems, there are two key concepts to be aware…
In this article, you’ll learn about zero-day and DDoS attacks as well as some of the strategies they use. This article will introduce two unique threats to organizations: zero-day and DDoS attacks.…
In this article, you will learn about two types of web attacks: Cross-Site Scripting and Cross-Site Request Forgery. Cross-Site Scripting (XSS) is a common web application vulnerability that occurs when a web…
In this article, you’ll learn various SQL Injection techniques and strategies to mitigate these attacks. When you log in to Gmail, you provide a username and password which are used to authenticate…
It seems like nothing else could go wrong with this computer. If this was a game of malware bingo, you would be one step away from winning the jackpot. For fun, you…
The rootkit allowed someone access to this computer. What did they do with that access? You realize that the rootkit was used to deny the user access to files on their system…
While the presence of spyware makes it obvious something nefarious was installed on the computer, was anything else installed? Ugh, of course. After more digging, you find a Trojan Horse. Wow, is…
ChatGPT has landed and it has sent large shockwaves through many industries. One particular industry where it’s gaining popularity is corporate Learning & Development (L&D). But how effective is it as a professional…
Abstract: Collecting and analyzing stakeholder feedback plays a vital role in cross-functional team building as it enables a comprehensive understanding of the needs, expectations, and perspectives of individuals impacted by or involved…
It’s your first day on the job at Cybercademy — a new cybersecurity organization that helps companies improve their security practices. Your Task Identify various types of malware on an infected device…
Cyber Threats and the Threat Landscape The threat landscape is ever-evolving and ever-expanding. The constant conflict between attackers and defenders pushes attackers to develop new attacks and defenders to develop new ways…
In this article, you’ll learn about some standards, regulations, and frameworks that govern and support cybersecurity. Cybersecurity is serious business; the potential consequences for a security breach can be dire, particularly if…
Cybersecurity was invented as soon as the first group of people attempted to defend from digital attacks. We’ll walk through a brief history of cybersecurity through the 60’s, 70’s, all the way…
John P. Kotter’s article, “Leading Change: Why Transformation Efforts Fail,” published in the Harvard Business Review in 1995, discusses the challenges that organizations face when attempting to transform themselves. Kotter, a Harvard…
Introduction:In his 1995 Harvard Business Review article, “Leading Change: Why Transformation Efforts Fail,” John Kotter addresses the difficulties and challenges that organizations face when attempting to implement change. He argues that successful…
The article by Karl E. Weick and Robert E. Quinn, entitled “Organizational Change and Development,” provides an in-depth review of the existing research and theories on organizational change and development. The authors…
In 1947, Kurt Lewin published an article in Human Relations titled “Frontiers in Group Dynamics: Concept, Method, and Reality in Social Science; Social Equilibria and Social Change.” This seminal paper is considered…
“Built to Last: Successful Habits of Visionary Companies” is a book written by James C. Collins and Jerry I. Porras and was published in 1994 by HarperCollins Publishers. The book is a…