Across the country and around the world, cyber attackers continue to discover new and improved ways of wreaking havoc with company's business operations. Their nefarious activities are responsible for billions of dollars' worth of damages in intellectual property theft. While cyber security teams attempt to circumvent these onslaughts, increased technological advancements continue to speed up the time between perceived threat and actual intrusion. How can a business entity keep up?
TrainACE - IT and Cybersecurity Training Blog
What is Threat Intelligence?
[fa icon="calendar'] Sep 18, 2013 7:51:12 AM / by Ryan Corey posted in advanced persistent threat, Cisco, Cybersecurity, Information Assurance, threat intelligence, Ethical Hacking
Spammed and Hacked: How Social Media Can Pose a Security Risk
[fa icon="calendar'] Aug 26, 2013 5:12:40 AM / by Ryan Corey posted in advanced persistent threat, CEH, Cisco, cyber war, Cybersecurity, Information Assurance, Pentesting, Ethical Hacking
Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.
Look Out IT Job Seekers! Cyber Security is the Field to Join
[fa icon="calendar'] Aug 19, 2013 3:45:24 AM / by Ryan Corey posted in advanced persistent threat, Salary, CEH, Cisco, cyber war, Cybersecurity, Pentesting, Ethical Hacking
As cyber attacks increase in frequency and scandals involving governments hacking into private computers become more commonplace, it's no wonder that one of the most promising fields in the current IT sector would be cyber security. In fact, recent research has indicated that cyber security has grown by more than one hundred percent in the last year. Clearly, anyone seeking a job in the information technology area would do well to start at the first line of defense against hackers.
Hacked Cars and Hotel Rooms: Time to Rethink Security for a Technological Age
[fa icon="calendar'] Aug 6, 2013 4:02:44 AM / by Ryan Corey posted in advanced persistent threat, CEH, Cisco, cyber war, Cybersecurity, Pentesting, Ethical Hacking
Criminals have been breaking into websites and electronic databases for many years. Although this can result in huge monetary losses, it rarely injures anyone or causes physical damage. However, hackers are gaining more destructive power as manufacturers add network interfaces and microprocessors to mechanical devices. This is a security threat that we cannot afford to ignore.
Cloud Security and Data Location: Where are We Today and Where are We Going?
[fa icon="calendar'] Jul 11, 2013 4:15:54 AM / by Lauren Archambeault posted in Cisco, Cloud Computing, Cybersecurity
As the recent scandal involving the National Security Agency demonstrates, cyber security is more relevant than ever. While computer companies continue to push the idea of saving and accessing information on the cloud, an important question remains largely unanswered: Just how secure is the cloud?
The Most Common Jobs for Cisco CCNP Certified Professionals
[fa icon="calendar'] Jun 24, 2013 1:27:26 PM / by Ryan Corey posted in Salary, CCNP, Cisco, Networking
The economy might still be limping along, but the IT industry remains as healthy as ever. IT outsourcing companies have become popular in recent years, but larger companies from hospitals to manufacturers are also hiring for a continually growing workforce of in-house IT professionals. If anything, the high job demand present in the early '00s has increased since the 2008 recession. Networking, a distinct career path in IT, remains one of the main stays.
Honey Netting Hacker’s Breakfast Seminar Recording Now Available
[fa icon="calendar'] Jun 11, 2013 4:45:59 AM / by Katrina Lowe posted in Cisco
With over 100 attendees, our latest Hacker’s Breakfast Training Seminar was a huge success. We partnered with FireEye to bring those in attendance two subject matter experts speaking on a theme of Advanced Persistent Threat. TrainACE’s key note, Timber Wolfe, spent over an hour discussing the emerging technology of Honey Pots and how vital these tools are becoming to help analyze and catch unwanted visitors of a network. The wait is now over and this seminar can be viewed in its entirety here: https://www4.gotomeeting.com/register/990401775
The Most Common Jobs for Cisco CCNA Certified Professionals
[fa icon="calendar'] Jun 10, 2013 4:13:18 AM / by Ryan Corey posted in CCNA, Cisco, Jobs, Networking, Online Training
Professionals who are certified through the Cisco CCNA program are qualified for a number of jobs in the technology field. The exams required for this certification demand that each candidate demonstrate an ability to install, configure, and operate a variety of networks, making these qualified individuals flexible workers. Successful CCNA graduates are able to troubleshoot systems, operate under a number of different protocols, and demolish threats to a network’s security. This is a broad range of skills, and the Cisco CCNA certification provides each professional with a comprehensive understanding of networks. These skills allow CCNA certificate-holders to tackle a number of technology-related occupations.
The Most Common Jobs for People Who Hold the EC-Council Certified Ethical Hacker (CEH) Certification
[fa icon="calendar'] May 20, 2013 3:45:05 AM / by Ryan Corey posted in CEH, Cisco, Cybersecurity, EC-Council, Information Assurance, Pentesting, Ethical Hacking
The term "hacker" is often associated with illegal online activity. However, there are hackers who perform 100 percent legal services, which are based on evaluating the information infrastructures of companies. For those who hold the Certified Ethical Hacker certification from the EC-Council, there are several jobs to consider that come with attractive compensation. Some of the most common jobs for hackers holding the CEH certification include computer forensics, incidence response, penetration testing and security analysis. Penetration testing is the most common job for new hackers, but some later advance to become engineers or take on a wider variety of tasks.
The Most Common Jobs for CISSP Certified Professionals
[fa icon="calendar'] May 13, 2013 5:15:03 AM / by Ryan Corey posted in Salary, Cisco, CISSP, Cybersecurity, Information Assurance, Jobs
A Certified Information System Security Professional (CISSP) is someone with considerable experience in information technology (IT) security fields who has also completed a rigorous exam to verify his or her qualifications. CISSP holders must also meet continuing education requirements to maintain their certification.
Introducing the Cisco ISR-AX
[fa icon="calendar'] May 3, 2013 11:40:22 AM / by Ryan Corey posted in CCNA, Cisco, Networking, Online Training
Two IT hosting trends, the central data center and the cloud, are changing Internet infrastructure requirements. Organizations are seeking to lower cost and complexity while better serving internal and external customers in diverse locations. As IT centralizes application hosting, Cisco has responded with the introduction of the Integrated Services Router with Application Experience or ISR-AX. ISR-AX combines a branch router, application optimization, and security and performance features in one box.
The Scoop on the New DIARMF Process
[fa icon="calendar'] Mar 5, 2013 4:02:09 PM / by Ryan Corey posted in Cisco, Cybersecurity, Information Assurance
The Department of Defense last changed its approach to cyber security, or, in DoD parlance, “Information Assurance,” in 2006, when Defense Information Technology Security Certification and Accreditation (DITSCAP) was replaced by Defense Information Assurance Certification and Accreditation Process (DIACAP). The small change in name, with “Technology Security” replaced by “Assurance,” said little about the reason for the change in system, but one intent of DIACAP was the promotion of consistency and standardization, all in the hope that cross-service reciprocity and cost savings would follow.