10 questions to my Mentor Mark Orlando-CEO Bionic Cyber
Key Cyber Solutions (KCS) is committed to developing future leaders interested in pursing careers in technology. As part of our outreach...
People, Process or Technology...Which is more important?
If you have been in the corporate world or in the technology field, I am sure you have inevitably seen the three overlapping circles that...
The Role of Ethical Hackers in DevSecOps - Development Alongside Offensive Security Measures
My goal here is to provide a high-level overview of the importance of ethical hackers within DevSecOps methodologies, as well as...
10 Questions to my Mentor Dr. Michael Bachmann, RADM/USN(RET)
10 Questions to my Mentor Dr. Michael Bachmann, RADM/USN(RET)
Navigating the World of IT Security Certifications - Which Path is Best for Me?
A good friend of mine interested in infosec as a career asked me the other day, "What certifications should I get, and which do you...
10 Steps to CMMC Supplier Certification
The DoD finalized and released the CMMC requirements in late January 2020 and by 2025 all DoD suppliers must be CMMC certified. With five...
Obtaining the CEH (Certified Ethical Hacker) Certification - My Journey and Tips for the Exam
My Journey and Tips for the Exam...
The Gamification of Hacking and InfoSec - How and Why to Start "Capture the Flag" (CTF) Right Now!
This year is weird. This pandemic has turned everything upside down for most of us, including myself. I’m tired of hearing about the...
Why Gamers Make Excellent Cybersecurity Personnel
I am a 26-year-old cybersecurity analyst. I grew up a rather typical gaming millennial, and now I have a budding career in the...
How-To: Sole-Sourcing a HubZone Contract
The Historically Underutilized Business Zones (HUBZone) program, created by the Small Business Administration (SBA), provides federal...