Building a Security Awareness Program on an Organizational Level

| | Security Awareness
Introduction: A Case Study Liz Raymond finally had some peace and quiet in her office. The day had been quite chaotic, but now that there were only a few minutes left before a relaxing weekend and... Go on to the site to read the full article ... Read More

How to Implement a Data Privacy Strategy – 10 Steps

| | Security Awareness
Introduction Ensuring data privacy is one of the biggest challenges organizations face. A quick look at the statistics related to personal data leaks in 2017 is more than enough to prove that a... Go on to the site to read the full article ... Read More

How to Comply with GDPR Privacy Regulation in 6 Steps

| | Security Awareness
Introduction In recent years, data breaches involving personally-identifiable information (PII) scaled to unprecedented numbers. The Equifax case alone affected more than 145.5 million people,... Go on to the site to read the full article ... Read More

5 Commercial Threat-Hunting Platforms That Can Provide Great Value to Your Hunting Party

Introduction Threat hunting is the process of proactively looking for anomalies within a company’s network or devices and discovering if they represent the trails left by stealthy attackers. This is... Go on to the site to read the full article ... Read More

Types of Threats That Can Be Hunted

|
Introduction As cybercriminals constantly develop new, more advanced attacks and become as organized as any other crime syndicate, it makes perfect sense that most intelligence-driven SOCs (Security... Go on to the site to read the full article ... Read More

How to Become a Threat Hunter

Introduction A cyberthreat can be defined as any adversary with three basic characteristics: the intent, capability and opportunity to do harm. While a traditional cybersecurity strategy can do quite... Go on to the site to read the full article ... Read More

Threat-Hunting Process

Introduction Consider this: No system is absolutely protected from cyberthreats. Even in the case where the best, most recent and effective security solutions are in place, there is always the chance... Go on to the site to read the full article ... Read More

The Ultimate Guide to Threat Hunting

| | Threat Hunting
Introduction At its essence, cyberthreat hunting can be quite similar to real-world hunting. It requires a uniquely skilled professional possessed of considerable patience, critical thinking,... Go on to the site to read the full article ... Read More

Security+: Implementing Identity and Access Management (IAM) Controls

|
Identity and access management (IAM) are among the most essential information security controls. After all, making sure a user actually is who he/she is claiming to be before providing access based... Go on to the site to read the full article ... Read More

Security+ Domain #4: Identity and Access Management

|
Introduction Put simply, Identity and access management (IAM) can be defined as the security discipline that makes sure the right individuals can access the right resources, at the right times,... Go on to the site to read the full article ... Read More
Loading...