The CSO Conference & Awards: A Brief History
Blockchain Technology: From Hype to The Future
Tools to Meet Tomorrow’s Mobile Cybersecurity Threats for Government
Account Takeover Fraud: Navigating the Treacherous Digital Waters
The Importance of Jailbreaks for iOS Security Work
{Latest Posts}
![Dead Computer, pile of computers, broken computers, cyber attack](https://www.uscybersecurity.net/wp-content/uploads/2018/09/Broken-computer-768x350.jpg)
Cyber Attack: The Only Safe Computer is a “Dead” Computer.
It is not so much “if” you will suffer a cyber attack, but “when”. There is an old saying in the industry that goes, “The only safe computer is a ‘dead’ computer.” Basically, this means
![Vulnerability Scanning, man typing, connected globe](https://www.uscybersecurity.net/wp-content/uploads/2018/09/Vulnerability-Scanning-768x350.jpg)
Top 10 Useful Network Vulnerability Scanning Tools
Network security is very important in today’s world. Network scanning, or rather network vulnerability scanning, has a crucial role to play in regards to the overall security of any enterprise and the data that it
![Man walking down red hallway with icons, threat intelligence abstract](https://www.uscybersecurity.net/wp-content/uploads/2018/09/Threat-Intelligence-768x350.jpg)
Threat Intelligence: How It Can Help Tackle Malware, Phishing and Hacking
Cyber attacks happen all the time and in multiple forms, causing tremendous harm — e.g., broken trust, financial loss, reputation damage, and intellectual property theft. So preventing and stopping threats surely sounds like a priority,
![Hand clicking on Morse Code, Cybersecurity History, Early Hacking](https://www.uscybersecurity.net/wp-content/uploads/2018/09/Cybersecurity-History-768x350.jpg)
Hacking Through History: Three People Who Hacked Without Computers
People usually attribute the history of cybersecurity to the Creeper. The Creeper was an infamous program that acted as the first virus in history. This 1971 virus was distributed to mainframe computers and possessed to
![Dark Lit Two Men Cybersecurity Career Engineer Lab](https://www.uscybersecurity.net/wp-content/uploads/2018/09/Cybersecurity-Career-768x350.jpg)
Cybersecurity Career
Cybersecurity is a growing threat. Last year, we saw 143 million Americans lost their personal, sensitive information in an Equifax data breach. This year, we saw Facebook allow our personal information to be mined by
![Script Kiddie hacking in a dark room, multi computer set up, young hacker](https://www.uscybersecurity.net/wp-content/uploads/2018/09/Script-Kiddie-768x350.jpg)
Script Kiddie: Unskilled Amateur or Dangerous Hackers?
Anyone can download software from the internet. These days, all it takes is someone with a computer and access to the web. There are thousands of hacking and security programs that exist online. These programs
![painter look at camera artists talent shortage](https://www.uscybersecurity.net/wp-content/uploads/2018/09/Painter-Art-could-solve-the-talent-shortage-768x350.jpg)
Artists Could Solve the Talent Shortage
It is no secret that we are in the midst of a talent shortage in the cybersecurity industry. Cybersecurity grew seemingly overnight. These days, we are dealing with that fallout every day. In fairness, we
![Hand unplugging, unplug, social media detox](https://www.uscybersecurity.net/wp-content/uploads/2018/09/Unplug-768x350.jpg)
Why People are Ditching Social Media
The Pew Research Center has released a new report that tracks the relationship people have currently with social media. It has been six months since Facebook revealed that they were allowing user’s information to be