Blog
By: Keyaan Williams
The Mayflower left Plymouth, England in September 1620 carrying 102 passengers who sought a new home that promised freedom and prosperity in the "New World." After 66 days, they began the work of establishing a village at Plymouth. Half the colonists died from exposure,...
By: Keyaan Williams
October is a popular month for horror movies, and while risk executives and corporate leaders are not running from Mike Meyers, Freddy Kruger, or the zombie apocalypse, the organizations they serve must remain aware of the real threats they face. This ensures that...
In the rapidly evolving landscape of cybersecurity, effective communication with boards of directors has emerged as a critical concern for organizations worldwide. As cyber threats grow in complexity and severity, the lack of communication between cybersecurity...
By: Kara Twombly, Zariah Williams, Markisha Beason & Omar Sickander
As the digital landscape expands at an unprecedented pace, the need for robust cybersecurity measures has become paramount. Artificial intelligence (AI) and machine learning (ML) are technologies that are revolutionizing the...
By: Zariah Williams & Omar Sickander
You’ve heard of megabytes (MB) and gigabytes (GB), but have you ever heard of zettabytes? A singular zettabyte (ZB) is equivalent to 1,000,000,000,000,000,000,000 (1021) bytes. In 2018 it was estimated that the entire world’s data was...
By: Omar Sickander & Zariah Williams
It’s that time of year once again when sports lovers settle in for a month of game-watching, bet-making, and trash-talking. This week kicks off the NCAA Basketball Tournament, also known as March Madness, where 68 men’s and...
Cybersecurity Awareness month has ended, but the importance of cybersecurity-minded organizations and training should not be forgotten. It may not be easy to implement all the innovative ideas and programs showcased by organizations worldwide last month, but it is...
By: Keyaan Williams
Once upon a time, Omar Sickander and I created the Cyber Career Lab (TM) to provide an alternative to expensive certifications and higher education that still helped people grow in their cybersecurity careers. “Ask me Anything” is an...
By: Sebastian Savage
If you are deeply plugged into the digital world, more than likely, you are familiar with the term Cybersecurity Awareness. If you have never heard the term, don’t worry, cybersecurity awareness means: Following and implementing specific steps or controls to keep...
By: National Cybersecurity Alliance
From social media to online shopping, our lives and the digital world become more and more intertwined every day. And while the digital world has afforded us a whole new level of convenience and access to information, it is imperative that consumers remember...
By: National Cybersecurity Alliance
With the global big data market set to be worth nearly $235 billion by 2026, to say that data is now core to business success today would be a massive understatement. From tweaking shipping strategies to delivering more relevant advertising...
By: Elizabeth Peters
What are Wearable Internet of Things (WIoT) devices?
Wearable Internet of Things (WIoT) devices are defined as technological infrastructure that interconnects wearable sensors to enable monitoring of human factors and including health, wellness, behaviors, and other useful...