
How to find weak passwords in your organization’s Active Directory
Introduction Confidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes. There are several security controls designed specifically to enforce confidentiality requirements, but one of the oldest and best known ... Read More
Are open-source security tools secure? Weighing the pros and cons
Introduction There is a myth that good security solutions are necessarily expensive, but the truth is that there are many options, not only at low cost, but even excellent free tools that can be employed to protect most businesses. A good example of this is OWASP’s list of free for ... Read More
Top 8 world crises exploited by cybercriminals and lessons learned
Introduction Crises can vary immensely, be it in terms of the specific nature of each situation or the impacts that may be limited to a specific group — or even an event such as the COVID-19, which... Go on to the site to read the full article ... Read More
How to align NICE Cybersecurity Workforce Framework KSAs with roles in your organization
Introduction Dealing with the many emerging cybersecurity challenges is a daunting task. With the ever-increasing number of attacks and cybercriminals that constantly update their techniques, it is... Go on to the site to read the full article ... Read More
How to prevent burnout in a cybersecurity career
Introduction: Picture, if you will … It was just another Wednesday. As usual, Grace Adams had arrived punctually at 8:00, even though she had worked late yet again last night. Her mind wandered as... Go on to the site to read the full article ... Read More
Cookies: An overview of associated privacy and security risks
Introduction Anyone who regularly browses the internet must have seen some sort of pop-up or other form of alert about the use of cookies. Some sites even give you the option to accept cookies... Go on to the site to read the full article ... Read More
Quantum Computation and Its Effects on Cryptography
Cryptography is a method of protecting communication and data through the use of codes, so that only the ones with authorized access can read and/or process it. Stating that cryptography is a... Go on to the site to read the full article ... Read More
Tips to Help You Move Beyond a Help Desk Role
Climbing the professional ladder is not an easy task, and this can seem especially scary when you are a newcomer at an entry-level position. In truth, taking into consideration today’s global market,... Go on to the site to read the full article ... Read More
CylancePROTECT – Product Overview
Malicious code can have a devastating effect on organizations. This has been clearly demonstrated again and again in recent cases such as the ransomworm WannaCry, which in 2017 exploited the... Go on to the site to read the full article ... Read More
Everything You Need To Know About Red Teaming in 2018
Introduction An old military saying states that in a long-running conflict, the opposing parties eventually adopt similar tactics. Well, if there is a long-standing conflict in the digital world... Go on to the site to read the full article ... Read More