SIEM for ICS/SCADA Environments
Introduction Security Information and Event Management (SIEM) solutions are the traditional IT go-to for organizations looking to get the most out of their vast information load, which includes... Go on to the site to read the full article ... Read More
Firewalls For ICS/SCADA Environments
Introduction Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments are facing increasing exposure to the internet, giving nefarious parties and malicious... Go on to the site to read the full article ... Read More
Cyber Work Podcast: Teach yourself cybersecurity with skills-based education with John Wagnon
Introduction In this episode of Infosec’s Cyber Work Podcast series, host Chris Sienko speaks with John Wagnon, Senior Solution Developer at F5 Networks. They discuss skills-based education,... Go on to the site to read the full article ... Read More
Overview of phishing techniques: Order/delivery notifications
Introduction One thing no one can deny is that online shopping is a common practice these days. With this, of course, comes order notifications and delivery notifications when packages arrive.... Go on to the site to read the full article ... Read More
Information security auditor certifications
Introduction For those with a passion for information security and a mind for auditing, the role of information security auditor is tailor-made. Not only does it allow you to work in information... Go on to the site to read the full article ... Read More
Malware spotlight: Sodinokibi
Introduction Ransomware is not new at this point in time and will be with us for the foreseeable future, as new types of ransomware are constantly emerging. And sometimes, new ransomware makes a big... Go on to the site to read the full article ... Read More
The state of threats to electric entities: 4 key findings from the 2020 Dragos report
Introduction In January 2020, industrial cybersecurity firm Dragos released the North American Electric Cyber Threat Perspective, referred to as the Dragos report. This report summarized findings... Go on to the site to read the full article ... Read More
Cyber Work podcast: Cryptography careers and IoT vulnerabilities with Ted Shorter
Introduction In this episode of Infosec’s Cyber Work podcast series, host Chris Sienko speaks with Ted Shorter. Ted is co-founder and CTO of Keyfactor, a computer security firm. He has worked in... Go on to the site to read the full article ... Read More
Malware spotlight: Nemty
Introduction If the last five years or so have proven anything, it is that ransomware is here to stay as a threat in the cybersecurity wild. This should not be used as rationale to simply ignore the... Go on to the site to read the full article ... Read More
Cyber Work podcast: Election security issues for 2020
Introduction In this episode of Infosec’s Cyber Work Podcast series, host Chris Sienko spoke with Adam Darrah about foreign vote tampering and other election security concerns for the upcoming 2020... Go on to the site to read the full article ... Read More
