Cybersecurity Executive ToolkitCybersecurity ThreatsQuestions & AnswersRecent Cyber AttacksView All Resources What would a cyber war look like? I’m going to answer this question with a question: Did you know there are at…Kip BoyleDecember 17, 2019
Questions & AnswersView All Resources I have a strong background in programming and software development since am an Android developer and I want to start my career in Cyber Security, where do I start? This question was recently asked by Mohammad on Quora. Here's how I encouraged him to…Kip BoyleDecember 10, 2019
Cybersecurity Executive ToolkitNetwork SecurityQuestions & AnswersView All Resources How Does WPA3 Offer Better Security? WPA3 delivers several security improvements. Here’s a big one: When you connect to an open…Kip BoyleDecember 3, 2019
Cybersecurity Executive ToolkitQuestions & AnswersView All Resources What concept in cyber security do you hate the most and why? Here’s a big problem that bugs me: Most people manage cyber risks the way they manage…Kip BoyleNovember 26, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityQuestions & AnswersSecurity Risk AsessmentView All Resources How can cybersecurity leaders minimize human error? There are two main strategies I use when I’m in the role of CISO: Make…Kip BoyleNovember 19, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources How long, on average, does it take a company’s stock value to recover after a data breach? “Share prices of breached companies hit a low point approximately 14 market days following a…Kip BoyleNovember 12, 2019
Cybersecurity Executive ToolkitNetwork SecurityQuestions & AnswersView All Resources What’s the best password keeper that’s not based online? A journal of blank pages that you keep under lock and key when you’re not…Kip BoyleNovember 5, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources How can I delete all the information in my computer? For routine uses, I recommend “Darik's Boot and Nuke” (DBAN) using the “DoD Short” method.…Kip BoyleOctober 29, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources How good is Dashlane password management software? I’m not sure about Dashlane, but I can help you figure it out. Password managers…Kip BoyleOctober 22, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources Who creates computer virus, trojan, malware and ransomware, and why? The motivations for releasing malicious code onto the public Internet fall into four broad categories:…Kip BoyleOctober 15, 2019