Building a Security Awareness Program on an Organizational Level
Introduction: A Case Study Liz Raymond finally had some peace and quiet in her office. The day had been quite chaotic, but now that there were only a few minutes left before a relaxing weekend and... Go on to the site to read the full article ... Read More
How to Implement a Data Privacy Strategy – 10 Steps
Introduction Ensuring data privacy is one of the biggest challenges organizations face. A quick look at the statistics related to personal data leaks in 2017 is more than enough to prove that a... Go on to the site to read the full article ... Read More
How to Comply with GDPR Privacy Regulation in 6 Steps
Introduction In recent years, data breaches involving personally-identifiable information (PII) scaled to unprecedented numbers. The Equifax case alone affected more than 145.5 million people,... Go on to the site to read the full article ... Read More
5 Commercial Threat-Hunting Platforms That Can Provide Great Value to Your Hunting Party
Introduction Threat hunting is the process of proactively looking for anomalies within a company’s network or devices and discovering if they represent the trails left by stealthy attackers. This is... Go on to the site to read the full article ... Read More
Types of Threats That Can Be Hunted
Introduction As cybercriminals constantly develop new, more advanced attacks and become as organized as any other crime syndicate, it makes perfect sense that most intelligence-driven SOCs (Security... Go on to the site to read the full article ... Read More
How to Become a Threat Hunter
Introduction A cyberthreat can be defined as any adversary with three basic characteristics: the intent, capability and opportunity to do harm. While a traditional cybersecurity strategy can do quite... Go on to the site to read the full article ... Read More
Threat-Hunting Process
Introduction Consider this: No system is absolutely protected from cyberthreats. Even in the case where the best, most recent and effective security solutions are in place, there is always the chance... Go on to the site to read the full article ... Read More
The Ultimate Guide to Threat Hunting
Introduction At its essence, cyberthreat hunting can be quite similar to real-world hunting. It requires a uniquely skilled professional possessed of considerable patience, critical thinking,... Go on to the site to read the full article ... Read More
Security+: Implementing Identity and Access Management (IAM) Controls
Identity and access management (IAM) are among the most essential information security controls. After all, making sure a user actually is who he/she is claiming to be before providing access based... Go on to the site to read the full article ... Read More
Security+ Domain #4: Identity and Access Management
Introduction Put simply, Identity and access management (IAM) can be defined as the security discipline that makes sure the right individuals can access the right resources, at the right times,... Go on to the site to read the full article ... Read More