New 8-bit Game! Help the sysadmin get to his boss and win prizes Play Now
7 August, 2018 | Matt Middleton-Leal

How to Calculate Return on Security Investment

During my 20+ year career in IT, I have been involved in projects from many different angles. I have been an end user and a consultant; I have managed technology and I have sold it. But throughout it all, there has been one constant challenge:  How to assess the return on investment for a...
21 June, 2018 | Ryan Brooks

SysAdmin Magazine: Confessions of a Hacker

Hackers are always lurking nearby, ready to exploit any mistake you make in order to infiltrate your network. Stay one step ahead! Learn how they think, act and hide their nasty moves in the June edition of SysAdmin magazine. 4 Steps You Should Take If You Have Been Hacked A data breach...
15 May, 2018 | Jeff Melnick

Top 10 Most Common Types of Cyber Attacks

A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems. Today I’ll describe the 10 most common cyber attack...
1 February, 2018 | Ryan Brooks

Top 20 Critical Security Controls for Effective Cyber Defense

With data breaches increasing, more than ever organizations have to ensure that they have all necessary security controls in place to keep their data safe. As a response to growing security threats, the SANS Institute, together with the Center for Internet Security (CIS) and other organizations,...
Show more articles