David Teo talks about his journey from being an accountant to working in digital forensics. His journey starts when he started using computers and wanted to do more with them. From Accounting to Digital Forensics It was astonishing to learn… Continue Reading →
As people look for job opportunities, malicious actors will seize the opportunity to get personal information from victims. This personal information can lead to data theft, identity fraud, and account and service hijacking. “Exploring Fraudsters Strategies to Defraud Users on… Continue Reading →
Billions of people use the internet on a daily basis. Markets, jobs, and corporations use the internet to create sales of their products and generate revenue. However, there are some illegal activities that people and corporations do that many do… Continue Reading →
Data breaches happen to thousands of companies a day. There is no discrimination between each company as data breaches can happen to large or small organizations. In addition to data being stolen, there are some social and economic theories that… Continue Reading →
Bug bounties are run by businesses to find flaws and vulnerabilities in their applications and systems. Hired professionals and regular people can participate in a bug bounty program to find bugs and earn money from the found vulnerabilities. Bug Bounties… Continue Reading →
A Cybersecurity Analyst is an entry-level job. The job requires employees to monitor the network, respond to incidents, help with IT issues, and more. The Job of an Analyst A Cybersecurity Analyst is an entry-level position that requires network monitoring,… Continue Reading →
Information and national security need cybersecurity in order to stay safe and secure. However, there are threat actors that are willing to take any measures necessary to get their hands on confidential data. This leads to a term called information… Continue Reading →
As the world leans more and more into technology, people are starting to incorporate it into their lives. As technology starts to be used with more frequency, an addiction can occur especially with social media. Social media can have a… Continue Reading →
People from all over the world get most of their news from media outlets. When a cybersecurity threat is on the news, people automatically think if their data has been compromised or not. However, the media has been known to… Continue Reading →
The Human Integration System (HIS) is an interdisciplinary approach in developing and sustaining human and technology-based systems. A Human Centered Cybersecurity (HCC) is a part of the HIS which helps reduce human enabled errors. The HIS in Relation to the… Continue Reading →
© 2025 Brandon Burke — Powered by WordPress
Theme by Anders Noren — Up ↑