CompTIA A+ Exam 220-1001

| | General Security
If you’re looking for a career in IT technical support or field operations, one of the certifications to consider is CompTIA’s A+. Named by CIO magazine as one of 10 best entry-level certifications... Go on to the site to read the full article ... Read More

How to Build a Successful Continuous Monitoring (CM) Program

| | General Security
For years, continuous monitoring has been serving the IT industry regardless of the size of the businesses utilizing it. Historically, the ITIL programs featured this aspect, but now continuous... Go on to the site to read the full article ... Read More

Red Team Assessment Phases – Everything You Need to Know!

| | Penetration Testing
The antagonistic approach of a Red Team makes things challenging to an organization’s system, policies, anticipations and adaptations. These days, organizations want the Red Teams to challenge the... Go on to the site to read the full article ... Read More

Getting Buy-In for Your Security Awareness Program

| | General Security
Introduction When thinking of security awareness programs, some people already go on the defensive, saying that it is pointless. If they don’t say it, they still act like it. The real question is:... Go on to the site to read the full article ... Read More

How to Hire a Data Protection Officer

| | General Security
The imposition of the General Data Protection Regulation, or GDPR (beginning May 25th, 2018) has resulted in the rising importance of hiring a data protection officer. But what is the right way to... Go on to the site to read the full article ... Read More

The Best Information Security Certifications for Practitioners

| | IT Certifications
The information technology (IT) and cybersecurity fields are a great choice for those whose assets lie within technology but are not seeking a typical desk job where it’s all routine all day.... Go on to the site to read the full article ... Read More
VERIS INCIDENT FRAMEWORK

VERIS INCIDENT FRAMEWORK

| | Threat Hunting
The VERIS methodology was created by Verizon back in 2010. This was an effort to create an environment for the classification of specific information. The VERIS model is applied through the process... Go on to the site to read the full article ... Read More

Anti-Phishing Training vs. Software: Does Security Awareness Training Work?

| | Phishing
Due to the increasing advances in today’s technology, endpoint protection, and security software solutions are becoming even better at protecting your data. However, while this software is... Go on to the site to read the full article ... Read More

Top 10 Free Threat-Hunting Tools

| | Hacking
Threat hunting is an alternative approach to dealing with cyber-attacks, compared to network security systems that include appliances such as firewalls that monitor traffic as it flows through a... Go on to the site to read the full article ... Read More
Comparing Mobile & Web Application Penetration Testing

Comparing Mobile & Web Application Penetration Testing

Pentesting mobile applications is quite different from pentesting web applications. Comparing the two processes lets us make better choices for our security systems and saves time and money.... Go on to the site to read the full article ... Read More