CylancePROTECT – Product Overview

| | General Security
Malicious code can have a devastating effect on organizations. This has been clearly demonstrated again and again in recent cases such as the ransomworm WannaCry, which in 2017 exploited the... Go on to the site to read the full article ... Read More

Everything You Need To Know About Red Teaming in 2018

| | Penetration Testing
Introduction An old military saying states that in a long-running conflict, the opposing parties eventually adopt similar tactics. Well, if there is a long-standing conflict in the digital world... Go on to the site to read the full article ... Read More

Building a Security Awareness Program on an Organizational Level

| | Security Awareness
Introduction: A Case Study Liz Raymond finally had some peace and quiet in her office. The day had been quite chaotic, but now that there were only a few minutes left before a relaxing weekend and... Go on to the site to read the full article ... Read More

How to Implement a Data Privacy Strategy – 10 Steps

| | Security Awareness
Introduction Ensuring data privacy is one of the biggest challenges organizations face. A quick look at the statistics related to personal data leaks in 2017 is more than enough to prove that a... Go on to the site to read the full article ... Read More

How to Comply with GDPR Privacy Regulation in 6 Steps

| | Security Awareness
Introduction In recent years, data breaches involving personally-identifiable information (PII) scaled to unprecedented numbers. The Equifax case alone affected more than 145.5 million people,... Go on to the site to read the full article ... Read More

5 Commercial Threat-Hunting Platforms That Can Provide Great Value to Your Hunting Party

Introduction Threat hunting is the process of proactively looking for anomalies within a company’s network or devices and discovering if they represent the trails left by stealthy attackers. This is... Go on to the site to read the full article ... Read More

Types of Threats That Can Be Hunted

|
Introduction As cybercriminals constantly develop new, more advanced attacks and become as organized as any other crime syndicate, it makes perfect sense that most intelligence-driven SOCs (Security... Go on to the site to read the full article ... Read More

How to Become a Threat Hunter

Introduction A cyberthreat can be defined as any adversary with three basic characteristics: the intent, capability and opportunity to do harm. While a traditional cybersecurity strategy can do quite... Go on to the site to read the full article ... Read More

Threat-Hunting Process

Introduction Consider this: No system is absolutely protected from cyberthreats. Even in the case where the best, most recent and effective security solutions are in place, there is always the chance... Go on to the site to read the full article ... Read More

The Ultimate Guide to Threat Hunting

| | Threat Hunting
Introduction At its essence, cyberthreat hunting can be quite similar to real-world hunting. It requires a uniquely skilled professional possessed of considerable patience, critical thinking,... Go on to the site to read the full article ... Read More
Loading...