UA-72240440-1

Blog

Strategies for Deciphering Encoded Messages

Spiral Cipher Clocks | Transpositional Ciphers | Vigenere Table

Pig Pen Cipher, Porta Table, and Simple Ciphers

Matrix Cipher, Morse Code, and Pig Latin

Letter, Syllable, & Word Frequencies & Map Cipher

Invisible Ink & Messages and the Letter Spokes Cipher Clock

History of Cryptology and Hexadecimal Encoding

Graphical Ciphers & The Grille Method for Secret Messages

Double Transposition Ciphers

Diagraphic Substitution

Concealment Ciphers

Compass Ciphers

Cipher Clocks

Binary Ciphers

Alphabet Wheel Cipher

Alphabet & Word Correlated Ciphers

Cybersecurity Awareness Month – Cryptology Unit 1

Are you ready for big data and big challenges?

Health Care: HIPAA, Legal, Security – A Call to Action

Virtual Pwnd Network – What VPN Should Really Stand For

Do you stink at cyber hygiene?

Using Social Media as a Guide on Effective Management Communication

Penny Stock Scams & Manipulation Alive and Well, Unfortunately

The Story of the Urn – Are you contributing or consuming?

ROI – consider adversarial profit, breach loss, and proactive security costs

31 Attacks Since Monday – Email Alone

No Experience No Problem? Cultivating Cyber Security Ninjas

Cat & Mouse Between Adversaries and Advocates – Will We Ever Get Ahead?

Total Cost of Ownership – You’ll Pay for Risk Management One Way or Another!

Trust Nothing and Document the 5W’s and H to Improve the Value of your Intel

The Wonderfulness of Victim Abuse Notification

Bart Ransomware Encrypts Before Connecting to Remote C&C Server

Zero-day Flash (CVE-2016-4171) Exploited in the Wild – Are you Ready for What Comes Next?

Transparency & Trust – Essentials in any Security Program

People are Dying for Updates

To Insure or Not to Insure, that is the Question – Cyber Risk Liability Insurance primer

I’m Hiring – now what? Realities of Building out a Security Team in 2016

Preparing for Intrusion

How to install your own home Ethernet on the cheap

DEFCON 1 – Turkeys 1, Humans 0

What percentage of breaches are motivated by financial crime or espionage?

Credit Card Chip & Pin Changes Your Shopping Experience and Security Risks

ISSA International Article of the Year

Quickening of QuickTime Removal

Anubis & Wepawet – Goodbye and Farewell

Privacy versus Protection – where you stand on the debate?