Guide to COBIT 2019

Introduction The Information Systems Audit and Control Association (ISACA) has recently introduced the first update for its COBIT 5 framework. The updated version, COBIT 2019, will allow... Go on to the site to read the full article ... Read More

Cyberwarfare security solutions for large enterprises

| | Cyberwarfare
The impact of cyberwarfare The impact of cyberwarfare on political organizations and critical infrastructure vendors is well-documented. What is considerably less discussed, however, is how and why... Go on to the site to read the full article ... Read More

DDoS Attacks 101

| | General Security
Cybercrime is expected to cost businesses over $8 trillion over the next three years, according to the findings of a study by Juniper Research. But while large-scale phishing and ransomware attempts... Go on to the site to read the full article ... Read More

Hackers and “Carding”

| | Hacking
The process of stealing and using the information associated with a payment card for monetary gains, known as carding, is a leading cause of financial loss to consumers. This typically involves theft... Go on to the site to read the full article ... Read More

What Is an Information Security Business Manager?

| | General Security
An Information Security Business Manager is expected to function as a security leader within their designated role and partner with higher-ups to address security-related challenges. The tasks they... Go on to the site to read the full article ... Read More

Common Continuous Monitoring (CM) Challenges

| | General Security
Continuous monitoring (CM) is a crucial step for organizations to detect and mitigate the security events that may result in breaches. It offers detailed, up-to-date compliance and network status... Go on to the site to read the full article ... Read More

Breaking Down Drive-By Phishing Attacks

| | Security Awareness
For the past decade, drive-by download attacks have been the bane of organizations’ IT department. These occur when adversaries place malicious Trojans inside seemingly innocuous websites in an... Go on to the site to read the full article ... Read More

The Ultimate Guide to DoD 8570

| | DoD 8570
If you are either a systems security engineer or an IT security contractor who is interested in working for the DoD (Department of Defense), then you need to know about DoD Directive 8570. It is a... Go on to the site to read the full article ... Read More

How to Detect & Prevent Payroll Phishing Attacks

| | Phishing
Tax season is always the favorite time of the year for adversaries aiming to gain access to payroll data, but this year phishing schemes have surfaced earlier and in greater quantity than usual. A... Go on to the site to read the full article ... Read More

How to Add a Phishing Notification Button to Outlook

| | Phishing
“Phishing” is a form of Internet scam that has become much more common in the past few years. A phishing attempt will usually come in the form of an email that tries to fool you into... Go on to the site to read the full article ... Read More
Loading...