Recent Posts by Jesse Daniel Amos

 
Jesse's favorite program is Adobe Photoshop. He thought he was proficient at Excel until a Level 2 class blew his mind with so many new things. He loves producing videos of instructors sharing technical tips & tricks for you. He loves to travel to the various NHLG centers but is based in the Anaheim, CA center.

7 Keys to Microservices and Container Security

A major concern in the niche cybersecurity field of DevSecOps is microservices and container security. Just as true in cybersecurity as it is in athletics, building and maintaining great defense lifts an operation out of constant “fire-fighting” mode and up to a place where it can be proactive about growing the business. The thing to remember is that great cybersecurity begins with great security planning. As Benjamin Franklin advised, “A failure to plan is a plan to fail.”

Read More

Mobile and IoT Security Best Practices at the Office

For the billions of mobile and IoT devices that are used within organizations, IoT security professionals must consider using these IoT security solutions. According to research presented in a Cisco infographic, the number of “things” connected to the internet exceeded the number of people connected way back in 2008, and many analysts started reporting that there were more mobile devices on Earth than people starting back in 2014. 

Read More

7 Layers of Cybersecurity Threats in the ISO-OSI Model

When you think of networks as being structured in the seven layers of the ISO-OSI model, it makes sense that cybersecurity threats can happen at any layer. We can think of these layers as the “links” in our metaphorical chain. Moving outward from the user, data is entered into the network through software running on the Application layer. Through the Session, Transport, Network, and Data-Link layers and arriving at the other end, the Physical layer, the data travels back up the seven layers to arrive at its intended destination. Each layer has its own protocols and other communication standards that govern its efficient operation. So, you may be asking, where is the Security layer? Where does security fit in? The answer is “Yes.”

Read More

Microsoft Software Assurance Training Vouchers (SATV) Updates

 

Microsoft is updating Software Assurance Training Vouchers beginning in February 2020 to ensure Software Assurance stays relevant and useful to customers. With this change in direction, some Software Assurance benefits will be retired or changed to eliminate redundancies and better align Software Assurance benefits across Microsoft’s products and services portfolio. The changes made also simplify benefit redemptions and replace outdated implementation mechanisms. While each customer experience is unique, all customers can benefit from the ability to optimize their business performance through Software Assurance. 

Read More

What CA SB 1343 Means For My Company

Anti-harassment laws are always changing. New requirements stemming from the #MeToo movement strengthen harassment protections, while others clear up ambiguities in laws that were passed in prior years

Read More

Subscribe Here!