About admin

This author has not yet filled in any details.
So far admin has created 6 blog entries.

Spectre CPU Vulnerability Allows Unauthenticated Access to Websites!

By now you’ve probably heard about the CPU vulnerabilities that are making the news. This is one of the worst vulnerabilities we’ve ever seen. It may soon become possible, if it isn’t already, that the Spectre attack can be leveraged to steal the “session cookies” of your other tabs or browser windows just by visiting [...]

2018-03-19T15:03:21+00:00January 5th, 2018|Categories: Cyber Security|Tags: , |2 Comments

The Difference Between a Vulnerability Scan and a Penetration Test

One question we hear fairly often is, “What’s the difference between a vulnerability scan and a penetration test?” It’s easy to understand why there is so much confusion regarding these terms. People labeled “experts” have been misusing these terms interchangeably for years so it’s no wonder people regularly confuse these services with each other when [...]

Top 5 Cybersecurity Concerns Small Businesses Should be Aware of in 2018

2017 produced some of the biggest cyberthreats in history, resulting in damages that will cost over $6 trillion annually by 2021. If Equifax and Uber can get hacked…no business is safe. Here are the Top 5 Cybersecurity Concerns Small and Medium Businesses should be aware of in 2018 (and how to protect themselves). 1. [...]

2018-03-19T20:07:10+00:00December 12th, 2017|Categories: Cyber Security|Tags: , |0 Comments

The First 6 Steps to Becoming a Cybersecurity Expert

Interested in a career in Cybersecurity? It makes sense, this industry has the most unfilled positions in the world today. People often ask us how they can break into the cybersecurity industry. Well, lucky for them and you, here’s our answer! Sequoia President and Co-Founder, Sean Nobles, has developed a training program which, upon successful [...]

DEF CON 25 – 2017

Organizations have started looking to security experts like Sequoia to perform sanctioned red team operations to find out where they’re most vulnerable. By exposing and identifying where your organization is weakest, we understand exactly how to best protect you from the loss of sensitive data and client info. Many of the recruited hackers are [...]

2018-04-06T19:39:06+00:00August 7th, 2017|Categories: DEF CON|Tags: , , |0 Comments

Cybersecurity Education

While Cybersecurity degrees have become more available in recent years, most colleges have yet to offer much undergraduate coursework for related fields. Most cybersecurity professionals learned their skills via certificate programs and/or field training. With the demand for cybersecurity education programs and degrees increasing, more college curriculum programs and coursework should become available. However, [...]