CERT-CSIH Domain #2: Event/Incident Detection

Introduction The CERT-CSIH has multiple domains that need to be well understood if you are going to pass the exam. Just as we saw in our previous article relating to Domain #1 and its requirements,... Go on to the site to read the full article ... Read More

CERT-CSIH Domain #1: Protect Infrastructure

Introduction The CERT-CSIH is a useful certification for individuals that have worked in an incident response environment and wish to certify their knowledge. The CERT-CSIH (Certified Computer... Go on to the site to read the full article ... Read More

CERT-CSIH Domain Overview

Introduction Businesses rely heavily on their IT infrastructure in order to function, so when cyber-threats occur within the organization, you need the right people to handle the incident from the... Go on to the site to read the full article ... Read More

Roles and Responsibilities of Information Security Auditor

| | cisa
Most people break out into cold sweats at the thought of conducting an audit, and for good reason. Auditing the information systems of an organization requires attention to detail and thoroughness on... Go on to the site to read the full article ... Read More

How to Become An Information Security (IS) Auditor

| | General Security
Introduction Being a security auditor means working with companies while conducting audits of security systems relating to the IT infrastructure. The work can be difficult, as it is based in... Go on to the site to read the full article ... Read More

Carbon Black: Endpoint Security [product review]

| | General Security
Introduction Carbon Black Endpoint Security is an effective and user-friendly endpoint solution for user devices such as PCs and laptops. It features malware protection that keeps threats at bay... Go on to the site to read the full article ... Read More

Top 30 Incident Responder Interview Questions and Answers for 2019

| | Incident Response
Introduction As systems move into the cloud and are increasingly exposed to the Internet, incident responders are becoming more necessary in the corporate world. If you are pursuing this line of... Go on to the site to read the full article ... Read More

How Security Champions Can Build an Alliance With Developers

| | General Security
Introduction Although the term Security Champion is still relatively new, it has already become a mainstay within security and development circles, with a definition that has begun to evolve.... Go on to the site to read the full article ... Read More

Top 10 Endpoint Protection Software Solutions

| | General Security
We all hear about endpoint protection solutions in our daily lives, but how many of us have actually looked at the current state of play in the market? In this article, we have compiled a list of the... Go on to the site to read the full article ... Read More

Sophos: Endpoint Protection [product overview]

| | General Security
Introduction Sophos Endpoint Protection is an easy-to-use, simple application for your endpoint devices, whether they run Windows, Linux or Mac OS. It is able to protect a wide variety of systems... Go on to the site to read the full article ... Read More
Loading...