Renita and I had a late night conversation about how these corporations are removing remote work in the quest to gain complete control of our time. Renita Rhodes is a Vice President, Audit Manager in Cyber Security for a well...
Play EpisodeWhen it comes to cybersecurity threats, rootkits occupy a prominent position due to their insidious nature. Rootkits are clandestine software packages that aim to gain unauthorized access and control over computers. What's even more scarier, is t…
Firewalls are a fundamental component of network security. Understanding how Access Control Lists (ACLs) work is crucial for aspiring cybersecurity professionals. In this review, I will delve into five ACL configurations commonly used by netw…
(Objective 2.5: Given a scenario, implement cybersecurity resilience.) In the world of data backup and recovery, one common challenge is dealing with open files. When critical data, such as SQL databases or Exchange messaging systems, is constantly…