How to find weak passwords in your organization’s Active Directory

How to find weak passwords in your organization’s Active Directory

| | Security Awareness
Introduction Confidentiality is a fundamental information security principle. According to ISO 27001, it is defined as ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes. There are several security controls designed specifically to enforce confidentiality requirements, but one of the oldest and best known ... Read More

Are open-source security tools secure? Weighing the pros and cons

| | General Security
Introduction There is a myth that good security solutions are necessarily expensive, but the truth is that there are many options, not only at low cost, but even excellent free tools that can be employed to protect most businesses. A good example of this is OWASP’s list of free for ... Read More

Top 8 world crises exploited by cybercriminals and lessons learned

| | Security Awareness
Introduction Crises can vary immensely, be it in terms of the specific nature of each situation or the impacts that may be limited to a specific group — or even an event such as the COVID-19, which... Go on to the site to read the full article ... Read More

How to align NICE Cybersecurity Workforce Framework KSAs with roles in your organization

Introduction Dealing with the many emerging cybersecurity challenges is a daunting task. With the ever-increasing number of attacks and cybercriminals that constantly update their techniques, it is... Go on to the site to read the full article ... Read More

How to prevent burnout in a cybersecurity career

| | General Security
Introduction: Picture, if you will … It was just another Wednesday. As usual, Grace Adams had arrived punctually at 8:00, even though she had worked late yet again last night. Her mind wandered as... Go on to the site to read the full article ... Read More

Cookies: An overview of associated privacy and security risks

Introduction Anyone who regularly browses the internet must have seen some sort of pop-up or other form of alert about the use of cookies. Some sites even give you the option to accept cookies... Go on to the site to read the full article ... Read More

Quantum Computation and Its Effects on Cryptography

| | General Security
Cryptography is a method of protecting communication and data through the use of codes, so that only the ones with authorized access can read and/or process it. Stating that cryptography is a... Go on to the site to read the full article ... Read More

Tips to Help You Move Beyond a Help Desk Role

| | General Security
Climbing the professional ladder is not an easy task, and this can seem especially scary when you are a newcomer at an entry-level position. In truth, taking into consideration today’s global market,... Go on to the site to read the full article ... Read More

CylancePROTECT – Product Overview

| | General Security
Malicious code can have a devastating effect on organizations. This has been clearly demonstrated again and again in recent cases such as the ransomworm WannaCry, which in 2017 exploited the... Go on to the site to read the full article ... Read More

Everything You Need To Know About Red Teaming in 2018

| | Penetration Testing
Introduction An old military saying states that in a long-running conflict, the opposing parties eventually adopt similar tactics. Well, if there is a long-standing conflict in the digital world... Go on to the site to read the full article ... Read More
Loading...