• Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
Starby Four

Vibes|Music|Tech

  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram

No Widgets found in the Sidebar Alt!

  • Tech

    Post-Quantum Cryptography: The Race Is On

    March 18, 2021 /

    Quantum computers and quantum cryptography have become hot industry buzzwords that are popping up more in the press. With that, the question becomes what happens to the security of our data covered by today’s pre-quantum cryptography technology? This Forbes article helps highlight solutions on the way in the race to post-quantum cryptography: The good news is that solutions are on the way. Recognizing the urgency of the task and the time needed to formulate, choose, standardize and deploy new systems, the U.S. National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography (PQC) standardization process in 2016. In July 2020, NIST announced seven third-round candidates, covering both public-key encryption (PKE) and digital…

    read more
    Aaron Comments Off on Post-Quantum Cryptography: The Race Is On

    You May Also Like

    IPv6–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 14, 2021

    The Story of Super Mario Bros. 3 | Gaming Historian

    December 30, 2020

    Blockchain & Money: Session 20: Primary Markets, ICOs, and Venture Capital, Part 2, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021
  • Tech

    A 3-Tiered Approach to Securing Your Home Network

    March 10, 2021 /

    Some tips running from basic to advanced, on how to approach securing your home network from Daniel Miessler. via Daniel Miessler

    read more
    Aaron Comments Off on A 3-Tiered Approach to Securing Your Home Network

    You May Also Like

    Virtualization—NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 6, 2021

    Amazon’s “Sidewalk” Mesh Network Goes Live; All Devices Are Opted-In Automatically By Default

    June 8, 2021

    Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals…

    March 10, 2021
  • Tech

    Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals…

    March 10, 2021 /

    A group of hackers say they gained access to live feeds of 150,000 security cameras inside hospitals, prisons, schools and companies, including a Tesla factory. The hackers say they breached a massive trove of security-camera data collected by Silicon Valley startup Verkada Inc., gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. The data breach was carried out by an international hacker collective and intended to show the pervasiveness of video surveillance and the ease with which systems could be broken into, said Tillie Kottmann, one of the hackers who claimed credit for breaching San Mateo, California-based Verkada. Kottmann, who uses they/them pronouns,…

    read more
    Aaron Comments Off on Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals…

    You May Also Like

    Function Overloading–Functions–STRUCTURED PROGRAMMING Course Notes

    May 28, 2021

    Portable Computing Security & More–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 11, 2021

    5 Strategies for Reinventing Your Career in Uncertain Times…

    December 30, 2020
  • Tech

    What is Multi-Factor Authentication and Why is It Necessary?

    December 30, 2020 /

    Many people have heard the basics of account protection: Get a password manager for your online accounts, make your passwords complex and never reuse them. But what about Multi-Factor Authentication? What is Multi-Factory authentication, what’s so special about it, and why is it needed? Multi-Factor Authentication (MFA), also sometimes known as Two-Factor Authentication (2FA), adds another layer of security to the sign-in process giving accounts further protection against unauthorized access. MFA requires multiple (two or more elements) to be used in order to grant full authentication. Multifactor authentication consists of 3 major things: Something you know: This can be a password, or the answer to a security question that cannot…

    read more
    Aaron Comments Off on What is Multi-Factor Authentication and Why is It Necessary?

    You May Also Like

    How to Get Into Cybersecurity with No Experience [Video]

    December 30, 2020

    What is Hurricane Electric? Let’s Find Out Whilst Learning About Some Computer/Cyber Network Fundamentals!!!

    April 14, 2021

    Building a Real-World Network–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 15, 2021
  • Tech

    WSJ–“Companies Urged to Adjust Hiring Requirements for Cyber Jobs”…

    December 30, 2020 /

    News of the current shortage of cybersecurity professionals and the demand needed in the coming years to fill roles is seemingly ubiquitous these days. There’s an interesting article in the WSJ on the correlation between the shortage of cybersecurity capable applicants available and the job requirements being posted by hiring companies & HR departments. Despite holding a doctorate in computer science and having extensive military, federal and private-sector experience, Mr. Cunningham said he is routinely approached by companies offering entry-level positions. Job postings on social-media websites for positions usually regarded as gateway roles are rife with such requirements. For instance, one post on recruiting site Glassdoor for a security operations…

    read more
    Aaron Comments Off on WSJ–“Companies Urged to Adjust Hiring Requirements for Cyber Jobs”…

    You May Also Like

    Protected: What is Equinix? And Why Are They So Important??

    March 23, 2021

    What is Remote Code Execution?

    June 2, 2021

    Blockchain & Money: Session 6: Smart Contracts & DApps by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 15, 2021
  • Tech,  Vibes

    How to Get Into Cybersecurity with No Experience [Video]

    December 30, 2020 /

    I came across a great YouTube video titled, “How to Get Into Cybersecurity with No Experience” by Gerald “Gerry” Auger (Twitter, LinkedIn) of Simply Cyber. With Cybersecurity being in the headlines more and more, especially as companies and individuals grapple with the new Covid-economy, the demand for well-trained information security professionals continues to grow, exponentially. It is consistently listed in career/job outlook forecasts as one of the top sectors to watch in the coming years. So it comes as no surprise that the interest in this sector is growing and many are looking for ways to break into the field. Cybersecurity is especially interesting in that there seems to be…

    read more
    Aaron Comments Off on How to Get Into Cybersecurity with No Experience [Video]

    You May Also Like

    Hashes–Another Data Structure!!! [Ruby Programming Language Notes]

    May 18, 2021

    Windows OS Under the Hood–NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 10, 2021

    ‘Kings of Leon’ Will Be the First Band to Release an Album as an NFT; Making it a Digital Collector’s Item

    March 4, 2021
  • Tech

    Integrating Security Into Networking From The Ground Up…

    December 30, 2020 /

    This industry insight article from GCN discusses how moving forward, the convergence of security and networking will be needed to work together from an integrated perspective. As more of the workforce continues remote-work, the potential for attacks/threats/malicious actors increases and heightened security will continue to be of critical importance. Secure access service edge (SASE) and software-defined wide-area network (SD-WAN) technologies are designed to merge security and networking into a single, integrated solution that can rapidly and easily scale and adapt to expanding environments and requirements. These forward-leaning capabilities help agencies better plan for the future while ensuring security remains a top priority even amid ongoing changes. Traditional security solutions no…

    read more
    Aaron Comments Off on Integrating Security Into Networking From The Ground Up…

    You May Also Like

    Functions–STRUCTURED PROGRAMMING Course Notes

    May 27, 2021

    Blockchain Technology: In the News…

    February 5, 2021

    Arithmetic Operators Notes

    May 24, 2021
Newer Posts 

Archives

Categories

More

About

Documentation

Vim

Recent Posts

  • Metaverse security is a thing because security is still a thing…
  • What is a password manager and why do you need one…
  • What Is The Metaverse?
  • FAA Plans Warnings on 5G…What 5G Means for the FAA, FCC and Air-safety…
  • Blockchain & Money: Session 18: , by M.I.T. Sloan School of Management with Professor Gary Gensler

Tags

2020 A+ Bitcoin Blockchain C++ Careers CLI Cloud Coding CompTIA CompTIA A+ CompTIA Network+ Course Notes Covid-19 Crypto Cryptography Cyberattack Cybersecurity Data Structures Definitions Economy Essential Music Functions Learning Life M.I.T. Methods Mobile Music Music Video Networking News Notes NYC Peering Programming Ruby Security Structured Programming TCP/IP Tech Terminal The Internet Video Wireless Networking
© 2025 Starby Four.
Ashe Theme by WP Royal.