Quantum Computation and Its Effects on Cryptography

| | General Security
Cryptography is a method of protecting communication and data through the use of codes, so that only the ones with authorized access can read and/or process it. Stating that cryptography is a... Go on to the site to read the full article ... Read More

Tips to Help You Move Beyond a Help Desk Role

| | General Security
Climbing the professional ladder is not an easy task, and this can seem especially scary when you are a newcomer at an entry-level position. In truth, taking into consideration today’s global market,... Go on to the site to read the full article ... Read More

CylancePROTECT – Product Overview

| | General Security
Malicious code can have a devastating effect on organizations. This has been clearly demonstrated again and again in recent cases such as the ransomworm WannaCry, which in 2017 exploited the... Go on to the site to read the full article ... Read More

Everything You Need To Know About Red Teaming in 2018

| | Penetration Testing
Introduction An old military saying states that in a long-running conflict, the opposing parties eventually adopt similar tactics. Well, if there is a long-standing conflict in the digital world... Go on to the site to read the full article ... Read More

Building a Security Awareness Program on an Organizational Level

| | Security Awareness
Introduction: A Case Study Liz Raymond finally had some peace and quiet in her office. The day had been quite chaotic, but now that there were only a few minutes left before a relaxing weekend and... Go on to the site to read the full article ... Read More

How to Implement a Data Privacy Strategy – 10 Steps

| | Security Awareness
Introduction Ensuring data privacy is one of the biggest challenges organizations face. A quick look at the statistics related to personal data leaks in 2017 is more than enough to prove that a... Go on to the site to read the full article ... Read More

How to Comply with GDPR Privacy Regulation in 6 Steps

| | Security Awareness
Introduction In recent years, data breaches involving personally-identifiable information (PII) scaled to unprecedented numbers. The Equifax case alone affected more than 145.5 million people,... Go on to the site to read the full article ... Read More

5 Commercial Threat-Hunting Platforms That Can Provide Great Value to Your Hunting Party

Introduction Threat hunting is the process of proactively looking for anomalies within a company’s network or devices and discovering if they represent the trails left by stealthy attackers. This is... Go on to the site to read the full article ... Read More

Types of Threats That Can Be Hunted

|
Introduction As cybercriminals constantly develop new, more advanced attacks and become as organized as any other crime syndicate, it makes perfect sense that most intelligence-driven SOCs (Security... Go on to the site to read the full article ... Read More

How to Become a Threat Hunter

Introduction A cyberthreat can be defined as any adversary with three basic characteristics: the intent, capability and opportunity to do harm. While a traditional cybersecurity strategy can do quite... Go on to the site to read the full article ... Read More
Loading...