What Cybersecurity Threats Do We Face In The Cloud?
Last week I wrote that compliance and complacency are major challenges in the cloud. Yes, defensive technology is the same. However, the cloud poses some specific threats. Multitenancy Multitenancy scares people the most. You share cloud infrastructure with other customers. Your cloud services are running on virtual machines. Those VMs run on shared hardware. You […]
What Are The Cybersecurity Challenges Associated With Cloud Computing?
Several times recently, people have asked for suggestions or warnings I might have about cloud security. What cybersecurity threats should they worry about in the cloud? I’ll share with you what I told them: Compliance and complacency No, those aren’t high-tech attack techniques used by elite super-hackers. However, they will cause trouble for you. Let […]
How To Enter The Cybersecurity Field
During Cybersecurity Awareness Month we hear about how important security is. Do your part! Be careful! It’s important. But additionally, the field offers job opportunities. How can you enter the cybersecurity field? You Need a Multi-Part Foundation Cybersecurity builds on fundamental knowledge and skills. What does it take to harden a server, then a network, […]
Manage Expectations to More Easily Pass Certification Exams
Are you studying for a cybersecurity certification exam? Some people struggle because they expect the wrong things. So, here’s what you need to know. ACIC — I Also Get To Learn Learning Tree courses include a great added benefit. It’s the After-Course Instructor Coaching session. When I teach a Linux server course, I tell people […]
Should I Become a Certified Ethical Hacker?
For National Cyber Security Awareness Month, we are resharing some of our most popular cyber security blogs from the past year to ensure you are staying #CyberAware online – whether at home or in the office. Maybe you’ve heard a little about the Certified Ethical Hacker or CEH exam. You probably have some questions: What […]