Skip to content
Blog Contact Us
Delta Risk logo
  • SOC-as-a-Service
    • SOC-as-a-Service Overview
    • SaaS Application Security
    • Cloud Infrastructure Security
    • Network Security
    • Endpoint Security
  • ActiveEye Platform
  • Security Services
    • Security Services Overview
    • Cloud Security Professional Services
    • Pen Testing & Assessments
    • Incident Response Services
    • Cyber Threat Hunting
    • Cyber Security Exercises
    • Compliance & Strategy
  • Resources
    • Cyber Security Resources
    • CISO Guidebook
    • Data Sheets
    • Events
    • Videos
    • White Papers
  • About
    • About Delta Risk
    • Board
    • Leadership
    • News
    • Careers
    • Partners
  • Blog
  • Contact

Author: Matthew Kuznia

cyber security skills gap

Look in the Mirror to Solve the Cyber Security Skills Gap

June 23, 2017 | by Matthew Kuznia

At least once a day, I see a new article on the topic of how to close the cyber security skills gap.  Without fail, these discussions center on the need for public and private sector collaboration, early STEM education, skills-based training, and increasing cyber security programs and course options through colleges and universities. While these are… Read More

Categories: Data Security | Tagged: cyber security skills, cyber security training, cybersecurity
vulnerability scans

Cyber Handyman Skill #5: Tools to Run Basic Vulnerability Scans

June 2, 2017 | by Matthew Kuznia

Throughout our blog series, 5 DIY Cyber Security Skills Every IT Professional Needs to Master, we have looked at skills and tools that are useful for cyber handy men and women. Much like being able to use a hammer, screwdriver, drill, or saw, having the ability to use virtualization, nmap, understand code, and the command line enables many other DIY tasks…. Read More

Categories: Information Security | Tagged: infosec, vulnerability scan
command line

Cyber Handyman Skill #4: Get to Know and Love the Command Line to Simplify Your IT Tasks

May 19, 2017 | by Matthew Kuznia

In our previous blog in the series, “5 DIY Cyber Security Skills Every IT Professional Needs to Master,” I discussed the basics of coding and programming that every cyber handyman needs to know. Today, I’ll cover the command line, a cyber handyman’s best friend. I first thought about going the “Top X Most Useful Commands” route for this blog… Read More

Categories: Information Security | Tagged: command line, cyber security, infosec
youth code jam 2017

Cyber Handyman Skill #3: Translating Coding and Programming Structures

May 11, 2017 | by Matthew Kuznia

In our previous blog in the series, “5 DIY Cyber Security Skills Every IT Professional Needs to Master,” I discussed the importance of nmap as a critical command line tool that improves network visibility and overall security. Today, I’ll cover some concepts related to translating coding and programming structures. Being a resident cyber handyman isn’t easy. Not… Read More

Categories: Information Security | Tagged: data security, information security

Cyber Handyman Skill #2: How to Scan Your Network with Nmap

May 5, 2017 | by Matthew Kuznia

Two weeks ago, we introduced our “5 DIY Cyber Security Skills Every IT Professional Needs to Master” blog series. I discussed the first skill on the list, using virtual machines (VMs), and why they’re practically indispensable for simplifying day-to-day security tasks. Today, I’ll explain the importance of the network mapper, also known as nmap — a critical… Read More

Categories: Information Security | Tagged: cyber security, infosec
diy cyber security skills

5 DIY Cyber Security Skills Every IT Professional Needs to Master

April 21, 2017 | by Matthew Kuznia

Introducing the Cyber Handyman If you’re a homeowner like me, hopefully you have a few basic around-the-house skills – changing a light bulb, fixing a loose door handle, unclogging a shower drain, making sure the deadbolts lock properly. I run into a new issue every week it seems. If you’re fortunate, there’s at least one… Read More

Categories: Information Security | Tagged: cyber hygiene, cyber security, infosec, managed security
  • 1
  • 2
  • Next »
RSS Feed

Recent Posts

  • New ActiveEye Features Speed Threat Response, Improve Productivity September 10, 2020
  • 5 Tips for Kickstarting Your Cyber Security Program August 28, 2020
  • 4 Cyber Incident Scenarios You Should Exercise and Test August 20, 2020
  • How to Deal with Ransomware in 2020 August 14, 2020
  • Our Best Cyber Security Blogs of 2020: Mid-Year Update July 29, 2020

Categories

  • AWS Security
  • CISO
  • Cloud Security
  • Critical Infrastructure
  • Cyber Insurance
  • Cyber Security Awareness
  • Cyber Security Exercises
  • Cyber Security Hiring
  • Cyber Security Strategy
  • Cyber Security Threats
  • Data Privacy
  • Data Security
  • Employee Training and Awareness
  • Endpoint Security
  • Financial
  • G Suite Security
  • Healthcare
  • Incident Response
  • Information Security
  • Insider Threat
  • IT security
  • Legal
  • Malware
  • Managed Security
  • Managed Services
  • Network Security
  • News and Events
  • Patching
  • Penetration Testing
  • Public Sector
  • Ransomware
  • Risk and Compliance
  • SOC-as-a-Service
  • Social Engineering
  • Threat Hunting
  • Uncategorized
Delta Risk logo
106 S. St. Mary's Street
Suite 601
San Antonio, TX 78205

Other Locations

Managed Security Services

  • SOC-as-a-Service
  • SaaS Application Security
  • Cloud Infrastructure Security
  • Network Security
  • Endpoint Security
  • ActiveEye Platform

Security Services

  • Services Overview
  • Cloud Security Services
  • Pen Testing
  • Incident Response
  • Compliance
  • Assessments

Company and Resources

  • Leadership
  • News
  • Resources
  • Blog

© 2025 Delta Risk | All Rights Reserved

Privacy Policy | Your California Privacy Choices | EO/AAE | Sitemap | Contact