Coronavirus predictions: What are the long-term workplace implications of COVID-19?

| | General Security
Introduction: What will the world look like after the COVID-19 vaccine? Human societies are often challenged by events out of our control. Extreme weather events happen and take with them many... Go ...

Are there any new cybersecurity threats that come with 5G technology?

| | General Security
Introduction 5G technology has long been a source of controversy over health and security concerns. This is particularly true because the introduction of an open, all-software defined network will... Go on to ...

New Cisco report: SMB security posture catches up to enterprise counterparts

| | General Security
Introduction Small-to-medium businesses (SMBs) have a lot of things to deal with. They have a huge number of responsibilities but not a lot of resources to do them with and even fewer ...
Key Elements of an Information Security Policy

Key Elements of an Information Security Policy

Learn about SCADA security policies Learn the process of developing a SCADA security policy. This skills course covers: ⇒ Developing SCADA security policy ⇒ Security frameworks and strategy ⇒ And... Go on ...

Top 8 cybersecurity books for incident responders in 2020

| | General Security
Introduction Are you passionate about incident response? Do you want to build upon your knowledge of how to mitigate cyberthreats? If yes, then you’d love the nuggets of wisdom these cybersecurity... Go ...

Critical security concerns for the education industry

| | General Security
Balancing cybersecurity & compliance requirements in a resource-limited industry Executive summary The education industry has become a top hacker target: birth certificates, Social Security... Go on to the site to read the ...
14 best open-source web application vulnerability scanners [updated for 2020]

14 best open-source web application vulnerability scanners [updated for 2020]

Learn Vulnerability Scanning Learn about vulnerability scanning tools. This skills course covers ⇒ Application and container scans ⇒ Analyzing vulnerability scans ⇒ Vulnerability scanning LEARN MORE... Go on to the site to ...

How to identify and prevent firmware vulnerabilities

| | General Security
Introduction As creators of computer software begin to take security vulnerabilities more seriously, hackers are increasingly targeting the lower ends of the computer stack in hopes of stealing... Go on to the ...

Key findings from Infosec’s 2020 IT & security talent pipeline study

| | General Security
Fewer challenges facing our industry are more pervasive than the cybersecurity talent shortage. It’s an advanced persistent threat of the human variety that impacts nearly every component of an... Go on to ...

Lessons learned from the Fresenius ransomware cyberattack

| | General Security
Introduction to the Snake ransomware Fresenius is a German company that provides various health care services, including services for dialysis of people with chronic kidney failure. In the United... Go on to ...