The 10 Best Practices for Identifying and Mitigating Phishing

| | Phishing
Phishing (a form of social engineering) is escalating in both frequency and sophistication; consequently, it is even more challenging to defend against cyber-related attacks. These days, any... Go on to the site to read the full article ... Read More

Technical Skills vs. Soft Skills: Which Are More Important as an InfoSec Professional?

| | General Security
“People, Not Technology, Are Key Elements of Cybersecurity,” write Ivo Ivanovs and Sintija Deruma in an ISACA Journal issue. In fact, finding candidates with the right skillsets to... Go on to the site to read the full article ... Read More

10 Benefits of Threat Hunting

|
Introduction Organizations are constantly being challenged by an increasing number of cybersecurity threats. As the severity and frequency of attacks rise, there is a call for a more proactive... Go on to the site to read the full article ... Read More

CSSLP Certification: An Overview

According to Gartner, an information technology (IT) research and consultancy company, “over 70% of breaches of security vulnerabilities exist at the application level.” This is because... Go on to the site to read the full article ... Read More

CompTIA PenTest+: A New Certification Option

So, you want to be a pen-tester, a.k.a. white-hat hacker. Penetration testers protect an IT infrastructure from malicious hackers by simulating real-world attacks to identify possible entry points... Go on to the site to read the full article ... Read More

The Top 15 Must-Have Books in InfoSec

| | Resources
An essential part in building an information security (InfoSec) professionals’ expertise is played by hands-on experience and years of activity. However, a solid theoretical foundation is also... Go on to the site to read the full article ... Read More

Linux+ Certification and InfoSec Institute’s Linux-related Training and Courses

Linux operating system (OS) is used by many users both at home and at the office: it is running on personal computers, mobile devices, and web server systems on-premise, hosted or in the cloud. So,... Go on to the site to read the full article ... Read More

SSCP Certification: Overview and Career Path

Are you now—or want to become—an information security (InfoSec) professional and are not sure what certification to pursue? Well, an option might be the Systems Security Certified Practitioner... Go on to the site to read the full article ... Read More

CERT-Certified Computer Security Incident Handler (CSIH)

When unforeseen cyber events happen, how important is it to have the right people (Certified Computer Security Incident Handler-CSIH) or team (Computer Emergency Response Team-CERT or Computer... Go on to the site to read the full article ... Read More

CISA Certification: Overview And Career Path

| | cisa, Hacking
Introduction If you want to be an IT auditor, or are one now and don’t have a certification, then why not consider the Certified Information Systems Auditor (CISA) credential? This is among the 7 Top... Go on to the site to read the full article ... Read More
Loading...