Layer Seven DDoS Attacks

Layer Seven DDoS Attacks

What is Layer 7? The process of sending and receiving data from one host to another, data encapsulation, is possible due to the existence of a seven layer protocol suite presented as the OSI model... Go on to the site to read the full article ... Read More

How Criminals Can Exploit AI

Introduction Because tools for developing artificial intelligence (AI) sources and tutorials for its use are widely available in the public domain, it is expected that AIs for attacking purposes may... Go on to the site to read the full article ... Read More

Cooperation between Humans and Artificial Intelligence in the Name of Security

Artificial Intelligence (AI) – Machine Learning (ML) – Deep Learning (DL) Artificial intelligence as a term dates back to the 1950s, but only recently is coming into prominence because of... Go on to the site to read the full article ... Read More
Expert Tips on Incident Response Planning & Communication

Expert Tips on Incident Response Planning & Communication

An organization’s ability to recover quickly in the wake of a cyberattack is directly proportional to their incident response capabilities. In essence, incident response (IR) is a procedure... Go on to the site to read the full article ... Read More
Expert Interview: Leveraging Threat Intelligence for Better Incident Response

Expert Interview: Leveraging Threat Intelligence for Better Incident Response

Incident response (IR) is an important component of any cybersecurity program. When responding to incidents, your goal is to respond as quickly as possible in the most organized way to minimize... Go on to the site to read the full article ... Read More
How to Determine If You Need a SOC Team, CSIRT Team or Both

How to Determine If You Need a SOC Team, CSIRT Team or Both

SOC and CSIRT teams have distinctive roles and responsibilities. In this article we describe the differences between a SOC and CSIRT to help you determine which team will fill your... Go on to the site to read the full article ... Read More
The Components of a Successful Security Awareness Program

The Components of a Successful Security Awareness Program

According to the European Network and Information Security Agency, “Awareness of the risks and available safeguards is the first line of defense for the security of information systems and... Go on to the site to read the full article ... Read More
Expert Interview: Security & IT Risk Management Best Practices

Expert Interview: Security & IT Risk Management Best Practices

There is a certain correlation between a risk and an issue. To put it in simple terms, an issue is the result of a risk being realized. Therefore, risk management plays a vital role in proactively... Go on to the site to read the full article ... Read More
Understanding the Role of Threat Modeling in Risk Management

Understanding the Role of Threat Modeling in Risk Management

The increasing number of new security threats, breaches and regulations that have taken place in the past years has moved the process of threat modeling from an interesting theoretical concept into a... Go on to the site to read the full article ... Read More
CRISC Domain #1: IT Risk Identification

CRISC Domain #1: IT Risk Identification

The CRISC Exam consists of 4 domains, and this writing focuses on the first one. Often regarded as an adverse event, a risk is the likelihood of event to happen along with its concomitant... Go on to the site to read the full article ... Read More
Loading...