top of page
706.631.0778


Malicious Actors Exploit Versioning to Target Android Users
We discuss this very thing in our Ethical Hacking and Forensic courses! In the ever-evolving landscape of cybersecurity, threat actors...

David Bigger
2 min read
Â
Â
Â


Logging - SIEM vs SYSLOG
SIEM and SYSLOG are both tools that are used to monitor and secure networks and systems. However, they serve different purposes and have...

David Bigger
2 min read
Â
Â
Â


Weekly Cyber/IT Terminology 4-10-2023
LAN (Local Area Network) A type of computer network that is designed to connect devices within a small geographical area, such as a home,...

David Bigger
2 min read
Â
Â
Â


Expectation of Privacy
Expectation of privacy is a legal concept that refers to an individual's reasonable expectation that their personal information,...

David Bigger
3 min read
Â
Â
Â


Industrial Control Systems (ICS)
Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) are two closely related systems that are commonly...

David Bigger
2 min read
Â
Â
Â
bottom of page



