Cybersecurity is an undisputed concern within any industry – but how are organizations and businesses using the security data and information they collect to best ensure their businesses are protected from cyber threats? Threat hunting context Accordin…Read More Why threat hunting is obsolete without context
Enterprises and end-users are constantly reminded of the dangers associated with clicking on unknown links and documents. Images rarely top the list as would-be vulnerabilities, but it’s important to be cautious of these potentially risky files as well…Read More A picture is worth a thousand words, but to hackers, it’s worth much more
In 2020, attacks against Windows Remote Desktop Protocol (RDP) grew by 768%, according to ESET. But this shouldn’t come as a surprise, given the massive increase in people working remotely during the pandemic. With enterprises resorting to making RDP s…Read More Defending against Windows RDP attacks
In the wake of the Microsoft Exchange ProxyLogon zero-day and F5 BIG-IP security exploits earlier this year, many are questioning if and when should researchers publish proof of concepts for vulnerabilities and associated patches. Hafnium hackers were …Read More Is it OK to publish PoC exploits for vulnerabilities and patches?
It has become a mantra for businesses targeted by hackers to describe the incident as a “sophisticated cyber-attack”. Although true in some instances, the reality is that most cyber-attacks involve the use of easily preventable tactics including phishi…Read More Defeating typosquatters: Staying ahead of phishing and digital fraud
Training to increase employees’ security awareness and change risky behaviours among end users is important, particularly as the future workplace will be hybrid and many professionals will still be working remotely. After all, you don’t want your emplo…Read More Secure your cloud: Remove the human vulnerabilities
What are the Most Valued Cybersecurity Certifications in 2021? This is an important question for employers, recruiters, seasoned security professionals, and especially for those planning a cybersecurity career. The Information Security Careers Ne…Read More The Top Cybersecurity Certifications in 2021