

Zoom vs. Google Meet - From an Ethical Hacker's Perspective, Which is More Secure? (It's Google)
Before jumping into this, for security reasons detailed below (and because nobody likes click-bait), I'm just going to tell you immediately to use Google Meet as of today. Read my blog below for all the details I could compile from the web today. It's complicated, but to summarize, Zoom has a sketchy past, and while they've certainly made several improvements, Google Meet was built initially to meet strict business needs and regulations through as an offering through GSuite.


10 questions to my Mentor Mark Orlando-CEO Bionic Cyber
Key Cyber Solutions (KCS) is committed to developing future leaders interested in pursing careers in technology. As part of our outreach and development activities, we are featuring a series of interviews from experienced mentors who work with students and persons new to the Information Systems industry. In this article, we are excited to have Mark Orlando, CEO of Bionic Cyber, provide insights on preparing for and paving a pathway to a successful career in Cyber Security. Pl

People, Process or Technology...Which is more important?
If you have been in the corporate world or in the technology field, I am sure you have inevitably seen the three overlapping circles that show the famous jargon term of people, process and technology. An example of this is on the cover of this blog. Having been in the industry for over 20 years, I start to have an uneasy feeling when I see another slick powerpoint presentation that is done by a high paid consultant who has gotten his masters in powerpoint and/or spends hund


The Role of Ethical Hackers in DevSecOps - Development Alongside Offensive Security Measures
My goal here is to provide a high-level overview of the importance of ethical hackers within DevSecOps methodologies, as well as practically explain the methodology itself. You would think that, by today, most organizations and agencies have implemented DevSecOps (or at least a similar security-centric development model) in one way or another, but that is surprisingly not always the case. As a security professional, I have been stunned more than once to witness the lack of ba