Effective cybersecurity includes monitoring internal threats
Consider these two scenarios: First, burglars desire to break into a bank and steal the money held within. Expending a great deal …
Read ArticleA look at virtualization for CompTIA’s Cloud+
Last month, we looked at the first of the seven domains that are on the CompTIA Cloud+ certification entry-level exam (number CV0-001). This month, the focus turns to the second domain …
Read ArticleGroup effort: Effective cybersecurity requires participation from all
Ask a random person on the street what cybersecurity means to him or her, and you might get a response that refers to the most recent …
Read ArticleReal cybersecurity is not as easy as Hollywood makes it look
“I’ll just synchronize these firewall settings and bypass the encryption and we’ll be inside the system in a few seconds.” Words like these cause cybersecurity professionals …
Read ArticleEnergetic IT pro helps adults with disabilities enter technology careers
The Reverend Edgar J. Helms founded Goodwill Industries in 1902 in Boston, Mass., as a mission of his ministry. He trained the unemployed and poor to mend and repair …
Read ArticleStudying in reverse: A truly backwards approach to exam preparation
There are many different techniques that can be used by test-takers to study for exams. There is no system that can be singled out …
Read Article