Information

Security

SCROLL

Security Audits & Assessments

Let us help you pass your next certification.

Science Technology Engineering & Math (STEM)

Check out our STEM program.

Security Training

We offer onsite and online training courses.

Custom Computers

Check out our custom computers that can meet your needs from business applications, simulations, virtual systems and gaming.

Product Review

Let us review your product

Document Review

We review documentation such as books, thesis, dissertations, articles and research.

Media Content

We help news and other media organizations with content related to tech, security, privacy, Internet safety and STEM

Learn more about the Executive Editor of our site.

Latest Post

CMMC Level 3 Control – Email Sandboxing (SI.3.220)

/
An overview for this control states an organization should utilize sandboxing to detect or block potentially malicious email.  The action can prevent malicious files from entering the network and should be document in the Configuration Management Policy.

Zoom enacts security and privacy control to prevent Zoombombing

/
On April 5th, Zoom turned on the passwords and waiting room features for meetings by default aimed at users of their free version and those with a single license version to help prevent “Zoombombing”.

What is Zoombombing and how to defend against it

/
Zoombombing is when an unauthorized person or stranger joins a Zoom meeting/chat session and cause disorder by saying offensive things and even photobombing your meeting by sharing pornographic and hate images.

Kali 2020.1 Default Username & Password – kali kali

/
In Kali Linux 2020.1, both the default user and password will be “kali”

Intel Active Management Technology Multiple Vulnerabilities (INTEL-SA-00241)

/
Multiple potential security vulnerabilities in Intel Active Management Technology (Intel AMT) may allow escalation of privilege, information disclosure, and/or denial of service. Vulnerability Detection Result

Cybersecurity Maturity Model Certification (CMMC) Levels

/
The CMMC model has five defined levels, each with a set of supporting practices and processes. Practices range from Level 1 (basic cyber hygiene) and to Level 5 (advance/progressive).

Understanding Cybersecurity Maturity Model Certification (CMMC)

/
So, if you haven’t heard or if you are not familiar with the cybersecurity maturity model certification (CMMC), don’t worry about it, we are here to explain it all to you.

Cyber Safety for Students: The Back to School Edition

/
The goal is to help our students manage their digital lives responsibly.  Here are a few simple steps parents and students may use to help keep them safe while using their devices.

Marriott Data Breach and What You Need to Know

/
Marriott International said its Starwood guest reservation database was breached, exposing the personal info of about 500 million customers.

Testimonials

The programming class was great and I learned a lot.

The security assessment was spot on.