Interview With an Expert: How Does a CISO Learn to Be a CISO?

| | Hacking
The role of the chief information security officer (CISO) is quickly becoming more important as cybersecurity in general becomes more intertwined with companies’ business activities. This fact... Go on to the site to read the full article ... Read More
A Brief Guide to GDPR Compliance

A Brief Guide to GDPR Compliance

Introduction: What do you know about the GDPR? The European Union (EU) has a new data protection law – the General Data Protection Regulation (henceforth “the GDPR” or “the... Go on to the site to read the full article ... Read More
Layer Seven DDoS Attacks

Layer Seven DDoS Attacks

What is Layer 7? The process of sending and receiving data from one host to another, data encapsulation, is possible due to the existence of a seven layer protocol suite presented as the OSI model... Go on to the site to read the full article ... Read More

How Criminals Can Exploit AI

Introduction Because tools for developing artificial intelligence (AI) sources and tutorials for its use are widely available in the public domain, it is expected that AIs for attacking purposes may... Go on to the site to read the full article ... Read More

Cooperation between Humans and Artificial Intelligence in the Name of Security

Artificial Intelligence (AI) – Machine Learning (ML) – Deep Learning (DL) Artificial intelligence as a term dates back to the 1950s, but only recently is coming into prominence because of... Go on to the site to read the full article ... Read More
Expert Tips on Incident Response Planning & Communication

Expert Tips on Incident Response Planning & Communication

An organization’s ability to recover quickly in the wake of a cyberattack is directly proportional to their incident response capabilities. In essence, incident response (IR) is a procedure... Go on to the site to read the full article ... Read More
Expert Interview: Leveraging Threat Intelligence for Better Incident Response

Expert Interview: Leveraging Threat Intelligence for Better Incident Response

Incident response (IR) is an important component of any cybersecurity program. When responding to incidents, your goal is to respond as quickly as possible in the most organized way to minimize... Go on to the site to read the full article ... Read More
How to Determine If You Need a SOC Team, CSIRT Team or Both

How to Determine If You Need a SOC Team, CSIRT Team or Both

SOC and CSIRT teams have distinctive roles and responsibilities. In this article we describe the differences between a SOC and CSIRT to help you determine which team will fill your... Go on to the site to read the full article ... Read More
The Components of a Successful Security Awareness Program

The Components of a Successful Security Awareness Program

According to the European Network and Information Security Agency, “Awareness of the risks and available safeguards is the first line of defense for the security of information systems and... Go on to the site to read the full article ... Read More
Expert Interview: Security & IT Risk Management Best Practices

Expert Interview: Security & IT Risk Management Best Practices

There is a certain correlation between a risk and an issue. To put it in simple terms, an issue is the result of a risk being realized. Therefore, risk management plays a vital role in proactively... Go on to the site to read the full article ... Read More
Loading...