Both Silent Circle and Lavabit recently shut down their encrypted email services. Lavabit was the first to take action following word that the United States government wanted data handed over that would violate customers' privacy. Ladar Levison, owner of Lavabit, said he faced the decision of complying with the government and betraying the American people or ending the email service he worked hard to build. He also said that he was legally unable to explain the events leading up to his decision due to recent laws passed by congress blocking his freedom of speech.
Across the country and around the world, cyber attackers continue to discover new and improved ways of wreaking havoc with company's business operations. Their nefarious activities are responsible for billions of dollars' worth of damages in intellectual property theft. While cyber security teams attempt to circumvent these onslaughts, increased technological advancements continue to speed up the time between perceived threat and actual intrusion. How can a business entity keep up?
If you haven't heard the Cyber Education Symposium has been announced and will be held in Arlington, VA on 11/19 - 11/20/13. The event is going to be held at the Hyatt Regency Crystal City at Reagan National Airport, the address is:
Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.
Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber security, cyber war, hacking, information assurance, Security, security training
We’re excited to announce another installation of Hacker’s Breakfast, our free hacking training seminar series! This time we’ve teamed up with n2grate Government Technology Solutions to host an event with several speakers and training demonstration kiosks. Subject Matter Experts from Blue Coat and Solera Networks will be discussing mission assurance technologies and web-based security.
Most people who are looking in to taking the Certified Ethical Hacker (CEH) certification training with us want to know a few key points. The CEH certification is arguably the leading baseline penetration testing certification on the market. Our CEH training class prepares people for a career in the field by offering more hands-on training than any other competitor’s class out there. The class also has a pass rate on the certification exam OVER 99% (yes that’s correct, in the last year, about 550 people took the CEH with us and only 5 failed the exam). As you probably know, we offer classroom based training as well as online options, both are extremely effective.
Topics: advanced security, average salary, career change, ceh, CEH jobs, CEH salary, CEH training, certified ethical hacker, computer training, cyber security, EC-Council, hacking, information assurance, information technology career, IT training, Online Training, penetration testing, Security, security training
The term "hacker" is often associated with illegal online activity. However, there are hackers who perform 100 percent legal services, which are based on evaluating the information infrastructures of companies. For those who hold the Certified Ethical Hacker certification from the EC-Council, there are several jobs to consider that come with attractive compensation. Some of the most common jobs for hackers holding the CEH certification include computer forensics, incidence response, penetration testing and security analysis. Penetration testing is the most common job for new hackers, but some later advance to become engineers or take on a wider variety of tasks.
A Certified Information System Security Professional (CISSP) is someone with considerable experience in information technology (IT) security fields who has also completed a rigorous exam to verify his or her qualifications. CISSP holders must also meet continuing education requirements to maintain their certification.
The Certified Ethical Hacker (CEH) certification has become the benchmark for penetration testing certifications. From 2007-2011it became all the rage among the community. More and more hackers fled to the scene and started their careers off by passing the coveted CEH certification exam. There is no question that the CEH is still a highly sought after certification (especially because it was added to the DoD 8570 Directive), but its place in the field has changed. Before, the CEH was a symbol of hacking prowess, dignity, strength, wisdom, reverance, veneration, amazement (OK thats enough)... Now, it holds its spot firmly as the preeminent baseline or entry-level hacking / penetration testing certification.
Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber security, cyber war, EC-Council, exploit development, hacking, honey farm, honey net, honey pot, information assurance, Security, security training, threat intelligence
In the face of constant cyber threats, formal security standards have evolved to guide organizations in implementing effective countermeasures. With so many critical systems at risk, Information Assurance and other IT security experts rely on government and industry standards to keep an organization’s cyber security robust. Vendors and systems integrators also develop, test, and install systems and products according to these standards.