When you are charged with hardening a target while working in cybersecurity, you can’t just start the process by blindly throwing some money at some costly equipment hoping for results. Instead, an in-depth security assessment needs to be completed, meticulously inspecting every layer of protection the target has, […]
To prepare for the coming Winter semester, I decided to start reading ahead so that I am prepared for my first assignments. The way I learn best is through interpreting an author’s views on a subject and converting them into my own thoughts; so, I decided to continue […]
Due to a random request from a customer at work, I was tasked with locating a free screen-share application to utilize for a single-use. There are several products out there that can provide video conferencing, media sharing, or initiate a remote desktop, but in the end, Cisco Webex […]
You must be logged in to post a comment.