General security

Interview: Dr. Engin Kirda

Dr. Engin Kirda is the Co-Founder & Chief Architect of LastLine and research professor at Northeastern University and the director of the Northeastern In

Security+ Study Guide: Domain 1.0 - Network Security

For many years, IT and Security were not usually on speaking terms:  IT’s primary responsibility was to just get everything to work, and if it wasn’t to best

Interview: Cortney Thompson, Chief Technology Officer at Green House Data

Cortney Thompson is the Chief Technology Officer at Green House Data leading the strategic direction of the company's cloud hosting and colocation facilities

The seven steps of a successful cyber attack

Advanced cyber attacks can now nest inside a network for more than 200 days on average before being discovered. In the infamous Sony Pictures breach, the hac

Build A Simple Cloud Using the Open Hardware Technology

Abstract Data storage has become a critical problem that facing computer scientists. Not only is it the huge amount of data; it is also also the problem of s

Cyber Threat Assessment Template For Special Forces

The growing number of cyber threats highlight the risks that US critical infrastructure and Special Forces face. Once considered weak in nature compared to o

Interview: Chris Steel, Chief Solutions Architect at Software AG Government Solutions, Inc.

Chris Steel is the Chief Solutions Architect at Software AG Government Solutions, Inc., a leading software provider for the US federal government. The compan

ELF File Format

Executable and Linking Format (ELF) is the object format used in UNIX-like operating systems. This post introduces the ELF file format in the big picture of

How to Prevent a Domain Name Theft

1. Introduction The domain names may cost far more than a real estate. For instance, Facebook paid USD 8.5 million to buy fb.com. The high prices of the doma

Interview: J. Wolfgang Goerlich, Cyber Security Strategist for Creative Breakthrough

J. Wolfgang Goerlich is an influential leader and IT management executive with the ability to act as a cultural change agent, driving security initiatives an