Hugh’s technical and business acumen is top-notch. He is also a skilled communicator and published writer, specializing in making the technical knowable. His passion for life-long learning has played a critical role in his ability to become quickly well-versed on numerous technical and non-technical topics.
In this blog post, the CISA and CRISC certifications will be briefly examined and compared to identify the similarities and differences of each and its benefits. In addition, the most relevant target audience for each credential...
The widespread adoption of self-driving interconnected vehicles is a huge technological advancement. However, security and privacy concerns are a significant drawback to widespread adoption. There are security concerns about a hacker taking control of the vehicle/supporting infrastructure and/or theft of an individual's data...
The Certified Ethical Hacker (CEH) certification by the EC-Council is a well-known and longstanding credential for penetration testing. The CEH exam can be challenging, especially if one is a relative newcomer to penetration testing, has never taken a certification exam before, or just beginning the journey into the world of cyber security and/or information technology in general...
The Cisco Certified Network Associate (CCNA) is a globally recognized and well-respected credential. The CCNA certifies that the holder has verified knowledge and skills in network fundamentals, network access, IP connectivity, IP services, security fundamentals, and automation and programmability. The CCNA is designed to provide comprehensive training focusing on networking and IT infrastructure...
Spending the time and money to earn certification is a commitment. Asking yourself, "Is this worth it?" is an understandable question and makes perfect sense. Before pursuing a certification, candidates need to consider both the benefits (pros) and the drawbacks (cons) of the qualification...
Quantum computing (QC) is an up-and-coming technology and is widely considered the next monumental breakthrough in computing. It can potentially solve many of the most challenging and complex problems facing the world...
The potential of smart cities is immense. The convergence of people and technology to efficiently deliver services to the public and solve the problems of urbanization is one of the ultimate aspirations for smart city deployments. But there are challenges to smart city deployments. The most likely solution is to enforce policy and security requirements to mitigate these risks. But what is the cost to innovation and growth when regulations are imposed?...
Cybersecurity is a broad and dynamic industry. Unlike some industries or disciplines where the rate of change in its approaches and methodologies is relatively static, in cybersecurity (and technology), what you learned in school is probably already obsolete. The pace of change in cybersecurity and technology, in general, necessitates dedication to continuous learning and professional development by its practitioners...
Yesterday, I passed my CISSP exam on my first attempt. Thanks Luke Ahmed and all my “classmates” in this study group. This is an excellent resource I highly recommend to anyone pursuing their CISSP certification.
In addition to participating in this study group, here are some additional resources I used (** denotes the sources I highly recommend)…
Like many in the information security world, Hugh Shepherd has demonstrated decades’ worth of persistence, growth and a penchant for building community. First in his time in the military in the Army’s Signal Corps, then in a high-stress management consulting position and through to today as he deepens his cybersecurity skillset running his own freelance consulting business...
HSJR Global Solutions
Copyright © 2024 HSJR Global Solutions - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.