Security Audits & Assessments

Let us help you pass your next certification.

Science Technology Engineering & Math (STEM)

Check out our STEM program.

Security Training

We offer onsite and online training courses.

Custom Computers

Check out our custom computers that can meet your needs from business applications, simulations, virtual systems and gaming.

Product Review

Let us review your product

Document Review

We review documentation such as books, thesis, dissertations, articles and research.

Media Content

We help news and other media organizations with content related to tech, security, privacy, Internet safety and STEM

Learn more about the Executive Editor of our site.

Latest Post

Benefits of STEM Summer Camps

STEM summer camps can make summer learning fun and exciting by teaching kids about science, technology, engineering, and math.  The camps can give children an opportunity to continue learning more about a concept they were introduced to during the school year or event explore different STEM concepts they may not learn about in their classrooms.

Colonial Pipeline Ransomware Attack

One of the nation's largest fuel pipelines has been forced to shut down after being affected by a ransomware cyberattack.  Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. 

Non-sensitive PII + Sensitive PII = Sensitive PII

Non-Sensitive PII together combined with Sensitive PII = Sensitive PII

The Civilian Cybersecurity Reserve: A National Guard-like program to address growing cybersecurity vulnerabilities faced by the U.S. government

This would be like a Civilian Cybersecurity Reserve and it would be voluntary and by invitation only.  This would allow our national security agencies to have access to the qualified, capable, and service-oriented American talent necessary to respond when an attack occurs.

5 Teen Internet Safety Tips

How could our teens live without their smartphones, laptops, and other devices that allow them to go online, communicate and have fun with their friends in a safe manner?  We have provided five (5) tips they should remember.

Update Greenbone Vulnerability Management Plugins on Kali (NVT, Cert Data & SCAP Data) Automatically

Once you have installed or configured the Greenbone Vulnerability Management system it is a good idea to ensure it is kept up to date and running the latest security scripts to find the latest vulnerabilities as well as sync to the most updated nvt, scap and cert data.  The best way to do this is to create a script that sync’s the necessary data for you automatically each day.

CA.2.158 Ongoing Security Assessment (CMMC Level 2)

Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.

AC.1.004 Publicly Posted Information (CMMC Level 1)

Control information posted or processed on publicly accessible information systems.

MP.1.118 Media Destruction – Sanitation (CMMC Level 1)

Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse.


The programming class was great and I learned a lot.

The security assessment was spot on.