Safeguard your business with a Cyber Risk Management Program

Safeguard your business with a Cyber Risk Management Program

| | eBook, Resources
No one needs to be convinced of the need for cybersecurity and everyone knows that the need is becoming more acute. But how can you be confident that you’re getting the protection ...
AWS Certified Cloud Practitioner Training 2020 - Full Course

Expert Thoughts on How Infosec Pros Can Make the Most of Working From Home

We find ourselves in strange times. In response to the ongoing coronavirus epidemic, organizations have swiftly closed their offices and mandated that all employees begin working from home. This development has created ...
Getting Started with GRC: Helping organizations plan for a successful GRC program

Getting Started with GRC: Helping organizations plan for a successful GRC program

When you deploy a GRC solution, you have a chance to evolve your processes, and mature your organization’s culture and approach to risk management. Each chapter in this eBook explores a concept ...
Exposure: Managing Third-Party Risk in a Digital World

Exposure: Managing Third-Party Risk in a Digital World

Digital Transformation is creating new opportunities, while introducing new challenges. Public and private enterprises alike are under pressure to discover better ways of doing things; better ways to improve efficiency, reduce costs, ...
Cybrary LIVE Session: Enhancing Networking Security through Automation and Enrichment

Cybrary LIVE Session: Enhancing Networking Security through Automation and Enrichment

| | Resources, Webinar
Traditional methods of security event management is a constant struggle to keep up with modern volumes of data ingestion and tool complexity. Bridging this gap in analyst and security tool capacity to ...

Recommended Reading: Serverless Security, Application Security and Other Serverless Related Topics

From time to time, I’m getting asked to recommend books, articles, blog posts or conference talks related to AWS lambda security, serverless security, application security, and security testing. I decided to put ...

The Top 15 Must-Have Books in InfoSec

| | Resources
An essential part in building an information security (InfoSec) professionals’ expertise is played by hands-on experience and years of activity. However, a solid theoretical foundation is also... Go on to the site ...

16th March 2018 resources updates

Added to the AMD section of the Meltdown/Spectre resource page, which for administrative reasons has now been moved here. [16th March 2018] Not Meltdown/Spectre, but allegedly similar issues: Richi Jennings for Tech ...

12th March 2018 resources updates

Specific Ransomware Families and Types The Register: Cavalry riding to the rescue of DDOS-deluged memcached users – “Attacks tapering, as experts argue over ‘kill switch'” ESET: New DDoS attack method breaks record ...

8th March 2018 resources updates

Specific Ransomware Families and Types Bruce Schneier: New DDoS Reflection-Attack Variant SecurityWeek: Memcached DDoS Attack ‘Kill Switch’ Found ZDnet: Memcached DDoS: This ‘kill switch’ can stop attacks dead in their tracks Ransomware ...