Join Rob and Don as they talk about cybersecurity degree programs that they have taken. Rob will talk about his experiences taking courses at Western Governors University.  WGU offers a unique program that is performance based and different than traditional academic in...

How safe are we? If planes can be hacked and cars can be hacked, what is preventing terrorists or contract killers from hacking vehicles to kill the occupants? IoT continues to grow exponentially and the device that have life safety implications are just as insecure pe...

Espionage is nothing new, with the advent of technology why wouldn’t spies take full advantage of the benefits and ease of use technology offers. Today a new form of spying has emerged called cyber-espionage. In this episode we talk about the recent Kaspersky debacle....

On 21 OCT 2016 one of the largest scale Distributed Denial of Service (DDoS) attacks was launched against US based websites. One of the reasons it was successful was the attack source and vector. We will discuss how the attack was launch and introduce anatomy of a DDoS...

Please reload

Featured Posts

Does Security Awareness Work?

July 18, 2018

1/10
Please reload

Archive
Please reload

Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare

© 2018 by Donald E. Hester. Proudly created with Wix.com     |    Sponsored by

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon
  • SlideShare