DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers”Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn... BLOG What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years... Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own... Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... Best practices for keeping your Asset Register Up to Date July 15, 2020 It can be an arduous task to keep tracks of different assets that reside within an organization’s inventory. There can... Review of Access Rights July 10, 2020 The ancient way of security was unable to suffice the organization’s protection completely. With different attacks hovering in the network... Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by... Digital Signatures – What Are They and How Do They Work? June 22, 2020 A Digital Signature is a type of signature that guarantees that the contents of a message have not been altered... The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...
DEF CON Hacking Conference: “Hunting for Blue Mockingbird Coinminers”Hunting for Blue Mockingbird Coinminers. 100,000+ USD damage. 10,000+ USD mined. 1,000+ infected computers. 100+ malicious artifacts. 10+ malwares… Learn...
BLOG What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years... Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own... Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security... What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods.... Best practices for keeping your Asset Register Up to Date July 15, 2020 It can be an arduous task to keep tracks of different assets that reside within an organization’s inventory. There can... Review of Access Rights July 10, 2020 The ancient way of security was unable to suffice the organization’s protection completely. With different attacks hovering in the network... Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by... Digital Signatures – What Are They and How Do They Work? June 22, 2020 A Digital Signature is a type of signature that guarantees that the contents of a message have not been altered... The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...
What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years...
Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own...
Vulnerability Scanning, Penetration Testing, Red Teaming – Know the Difference July 28, 2020 Vulnerability scanning, penetration testing, and red teaming all belong to the branch of proactive security. Experts performing these offensive security...
What Is Cybersecurity Exercising? July 27, 2020 Goals? Cybersecurity exercises are designated for companies‘ IT staff, security teams, incident response teams, CSIRTs, CERTs, etc. The training aims...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Gargamel is a tool for acquiring the forensic evidence July 16, 2020 Gargamel is a Windows tool for acquiring the forensic evidence from remote Windows or Linux machines using several different methods....
Best practices for keeping your Asset Register Up to Date July 15, 2020 It can be an arduous task to keep tracks of different assets that reside within an organization’s inventory. There can...
Review of Access Rights July 10, 2020 The ancient way of security was unable to suffice the organization’s protection completely. With different attacks hovering in the network...
Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by...
Digital Signatures – What Are They and How Do They Work? June 22, 2020 A Digital Signature is a type of signature that guarantees that the contents of a message have not been altered...
The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the...
Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...
Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...