Cyber Work podcast: Top soft skills and the Federal Cybersecurity Reskilling Academy

Introduction In this episode of Infosec’s Cyber Work podcast, host Chris Sienko spoke with Chris Triolo, VP of customer success for Respond Software. They discussed the Federal Cybersecurity... Go on to the site to read the full article ... Read More

Top 5 enterprise tools that have free home trials

| | General Security
Introduction Cybersecurity threats and attacks are coming faster and more persistently than ever, especially with the scattered nature of companies and the altered day-to-day operations of nearly... Go on to the site to read the full article ... Read More

Overview of phishing techniques: Urgent/limited supplies

| | Phishing
Introduction The internet has made online shopping possible for all different types of suppliers and consumers. Online shopping is everywhere, whether it comes to social media-based “stores” or... Go on to the site to read the full article ... Read More

Network traffic analysis for IR: Data exfiltration

| | data exfiltration
Introduction Understanding network behavior is a prerequisite for developing effective incident detection and response capabilities. ESG research has found that 87 percent of companies use Network... Go on to the site to read the full article ... Read More

Phishing technique: Message from a friend/relative

| | Phishing
Introduction Like many other phishing scams featured on this site, friends-and-family imposter scams are common. These scams usually begin with a phone call impersonating a friend or relative, or... Go on to the site to read the full article ... Read More

Phishing technique: Message from the government

| | Phishing
Introduction With the evolution of the internet, online services have grabbed the attention of every sector, including the government. Nowadays, online amenities are available in almost all... Go on to the site to read the full article ... Read More

Phishing technique: Message from the boss

| | Phishing
Introduction Is it possible for you to ignore an email sent by your boss? Phishers believe that you probably would not, and this is the reason they are getting better at mimicking them. According to... Go on to the site to read the full article ... Read More

NIST CSF: Cybersecurity basics — Foundation of CSF

Introduction The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is all about the security of critical Infrastructure. NIST SP 800-30, Rev. 1 defines critical... Go on to the site to read the full article ... Read More

Network traffic analysis for IR: Analyzing IoT attacks

| | Analyzing IoT Attacks
Introduction The Internet of Things (IoT) incorporates everything from tiny sensors and devices to huge structures like cloud computing. IoT includes the major networks types, such as vehicular,... Go on to the site to read the full article ... Read More

Network traffic analysis for IR: Analyzing DDoS attacks

| | Analyzing DDoS Attacks
Introduction Distributed Denial-of-Service (DDoS) attacks are one of the powerful cyber weapons threat actors use today. We often hear about a website being “brought down by attackers,” and in most... Go on to the site to read the full article ... Read More

Secure Guardrails