[IMPORTANT] How to Stay Up-to-Date with Cyber Security

​It is imperative to stay up-to-date with the latest security news, threats, and vulnerabilities. Failing to stay up-to-date puts you at risk. Everyday you need to stay alert to the changing threat landscape so that you can react appropriately.

At Station X there are ​four important steps you should take now to stay up-to-date on everything cyber security related;

Step 1
Sign up to the StationX Threat Intelligence Report for weekly updates on the current threat landscape, current vulnerabilities and patches, new cool security tools and recommended reading.

Step 2
Connect with me on LinkedIn HERE and share my great network to help your career. ​

Step 3
Follow me on Twitter @GotoNathan HERE for the very latest information minute by minute. Important when every second counts.

Step 4
Follow our Cyber Security Blog for my thoughts on the latest trends.  Optionally follow my blogs RSS feed.

Never be left not knowing again!

  • Nathan House

    Nathan House is the founder and CEO of StationX. He has over 25 years of experience in cyber security, where he has advised some of the largest companies in the world. Nathan is the author of the popular "The Complete Cyber Security Course", which has been taken by over half a million students in 195 countries. He is the winner of the AI "Cyber Security Educator of the Year 2020" award and finalist for Influencer of the year 2022.

  • Eileena says:

    I’ve enrolled into one of your classes and look forward to starting in a few weeks. I have a question for you. What is the best security software for an older Mac>

    • Nathan House Nathan House says:

      Thank you. Your question is to broad without context. Its like asking what is the best engine for an older car!? Watch the course. We cover may different security tools for Mac.

      • Arthur says:

        I’ve used Macs 27 years. Never had any Mac malware that I’ve been aware of. I use Malwarebytes free. Be careful what sites you visit and what you click on and download. Avoid downloading pirated software. Don’t click on links in email. Change your DNS settings to use the quad9 service. Use strong passwords 12 characters or more. Keep programs updated. Some good common sense and knowledge goes a long way. 🙂

  • M.Abdo says:

    Thank You, Mr. Nathan

    It is important to be up to date at this field, When I see any research the main thing that is become to the top is the security even in any future technologies the question will be “What about the security?”

    Nowadays with the cloud computing and IoT SECURITY is needed more than then ever we can’t grantee 100% to secure our systems but we worked hard to doing Mitigate.

    Your sincerely..


  • Dharmveer Singh says:

    Thank You, Sir

  • Sithum Nimlaka says:

    Thank you sir

  • Talderon says:

    StationX Threat Intelligence Report – The URL only displays Header/Footer and no sign-up form. Has this been moved?

    Microsoft Edge
    Version 83.0.478.45 (Official build) (64-bit)


  • Gloria Anderson says:

    Thank you for your knowledgeable information.

  • Shruti says:

    Thanks for the information about cybersecurity and how to get updated.

  • pranay says:

    thank for a valuable information

  • shikha Gupta says:

    Thanks for a wonderful article.

  • Will Pape says:

    Nathan, what’s the best laptop for cybersecurity work e.g., Mac or Windows

    • Nathan House Nathan House says:

      You want a machine that can run virtual machines. Look to get a minimum of 4GB for your system. 8GB is good. 16GB will run 3 or 4 decent virtual machines. Make sure you have a SSD disk and modern CPU (Last 3 years). The CPU should be optimised for virtualization, such as those with AMD-V or Intel-VT extensions. 1.3GHz or faster core speed.

      You also need 250GB minimum so you have enough space to store the virtual machine guests.

      If you want to try WiFi hacking you need a WiFi adapter that can inject packets and works with Kali Linux. These cost about $40.

      I like the puri.sm products for Linux. They have a security, privacy and anonymity focus and can run most Linux distributions including Debian Linux, Tails and Qubes OS. 
      I also personally have a Mac Book Pro with top specs and run multiple Linux operating system VMs on it, plus a Purism for Linux too. But these are prohibitively expensive for many people. Its worth the price for me because im on my machines all day every day and run a business from them. Also the M1 chip in the new new Macs don’t support virtualisation well yet so watch out for that.

  • >