Small Step Towards Protecting Critical Infrastructure

The TSA has announced that there will be new cybersecurity requirements on major railroads and subways. The Washington Post reported the mandate from the White House, writing “The coming directive will require the largest and most critical rail and transit systems to identify a…

Another Data Breach

In yet another large scale cyber attack Neiman Marcus had its network breached and the personal information of as many as 4.6 million people was stolen. The data breach is believed to have occurred over a year ago in May of 2020, according to a report from…

Mandatory Incident Reporting

I feel very strongly that the US needs something like the European GDPR to protect consumers and the general public in the digital age. As far as best practices go, it is the gold standard of cyber security right now. …

Smurf Attacks

This week while studying for Sec+ I learned about smurf attacks. A smurf attack is a type of DDoS attack where the attacker forces a specific I.P. address to send packets to another I.P. …

8%

According to Opswat only 8% of organizations with web applications for uploading files have enough security. That’s less than one in ten. Almost all of these organizations cite security as a high priority, but almost all of them fall short.

With the increased demand for all things online this…

Password Tips

What makes a strong password? Is it better to have longer passwords or more complex passwords? And if you make a long random list of numbers, letters, and symbols how do you remember it?

One solution that is becoming more and more popular are password managers. By using…

US Cyber Defense

One thing that has been made crystal clear over the last few years is the United States need to improve it’s cyber defense in both the private and public sectors. Too many organizations and tools essential to our safety and our economy are vulnerable targets to anyone…

Even Baby Monitors Aren’t Safe

DigitalJournal.com published an article this week about baby monitors that had been shown to be possibly vulnerable to malicious actors. Hackers may be able to access live audio or video feeds from these devices (depending of course on capabilities). …

GDPR

This week I branched out a little in my job search and applied for a governance and compliance job for the first time. Up until now I had been looking for SOC analyst and helpdesk jobs, but a job posting for governance scrolled by and it caught my eye…

Zachary Wilson

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store