Ken Underhill
Ken has over 20 years of IT and cybersecurity experience and holds a graduate degree in cybersecurity. He's also the bestselling author of the book Hack the Cybersecurity Interview.
How To
A Guide to Cloud Identity and Access Management (Cloud IAM)
Discover how Cloud IAM addresses the security challenges of cloud environments, ensuring granular access control for enhanced protection and efficiency.
Tech Trends
Navigating Social Media Security: Protecting a Business Against Cyber Risks
Social media attacks are on the rise. Learn best practices for protecting a business (and a business’ employees) from bad actors.
Career Advice
Demystifying Cybersecurity: How Bootcamps Open Doors to Fulfilling Careers
Ready to switch careers to cybersecurity? Explore how bootcamps offer hands-on skills for all ages and help bridge experience gaps.
Career Advice
Age Diversity Potential for Careers in Cybersecurity
Older adults bring a wealth of experience and a strong work ethic that are invaluable for cybersecurity careers. This post explores additional (and highly valuable traits) that older workers possess that make them solid candidates for careers in the field.
Tech Trends
Endpoint Security: EDR vs XDR vs MDR
As cyberattacks escalate and remote work booms, safeguarding endpoints like desktops and laptops is crucial. Learn how endpoint detection and response (EDR), extended detection and response (XDR), and managed detection and response (MDR) help businesses armor up.
Tech Trends
Enterprise Cloud Security Best Practices
How can cybersecurity professionals help fortify enterprise companies against cyber threats? Through adherence to cloud security best practices.