Cybersecurity Executive ToolkitCybersecurity PolicyQuestions & AnswersView All Resources How can I write an email regarding IT Security that will be read, and not ignored by the end user? If you really want to change the way people behave, the core issue isn’t how…Kip BoyleDecember 31, 2019
PodcastsView All Resources Why does the FTC settle on cybersecurity cases? Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleDecember 24, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork Security What is more important, length or diversity of a password? Length. Here’s a simple example. Which of these passwords is more attack-resistant? &^567*=M barbell-farther-grocery-sans-bluster-voyageur It’s…Kip BoyleDecember 24, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsQuestions & AnswersRecent Cyber AttacksView All Resources What would a cyber war look like? I’m going to answer this question with a question: Did you know there are at…Kip BoyleDecember 17, 2019
Podcasts Exploiting IT Service Providers and their Customers Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleDecember 10, 2019
Questions & AnswersView All Resources I have a strong background in programming and software development since am an Android developer and I want to start my career in Cyber Security, where do I start? This question was recently asked by Mohammad on Quora. Here's how I encouraged him to…Kip BoyleDecember 10, 2019
Cybersecurity Executive ToolkitNetwork SecurityQuestions & AnswersView All Resources How Does WPA3 Offer Better Security? WPA3 delivers several security improvements. Here’s a big one: When you connect to an open…Kip BoyleDecember 3, 2019