When people ask what makes the 2012 LinkedIn data hack and the 2013 Myspace breach different than others, I tell them it shows how little we understand our enemy. This is obviously because the attacker mind set is constantly evolving,
Read More

Let's play a game. Let's see if I can guess one of your passwords, or at least part of it. Is it your dog's name? Does it have your birthday in it? How about your favorite sports team? Did I
Read More

Published Article from "IT PRO PORTAL" Speaking to Pluralsight author and industry expert Dale Meredith, he said there is currently a massive skills gap in this space, with the Information Systems Security Certification Consortium (ISC2) claiming there will be a
Read More

Don Jones interviews Pluralsight author Greg Shields about the state of VMware. Pluralsight authors Tim Warner and Dale Meredith join this week for the IT news update and security segments, respectively.
Read More

Learn about malware. This course will take you deep into the dark alley of how malware is used and deployed. We'll also dive into how Trojans and backdoors work. We'll look at what their purpose is, the signs that you
Read More

Cyber-skills training Educating employees around appropriate internet and email protocols is also vital. Dale Meredith, Pluralsight author for ethical hacking, says that although companies spend vast sums training staff to keep resources secure, they then fail to implement the necessary
Read More

Nowhere does the “it won’t happen to me” mentality have greater repercussions than with Internet security. According to a report from the Center for Strategic and International Studies, hackers cost businesses $445 billion every year from cyber theft. From
Read More