Considering the breadth and diversity of attacks facing today’s organizations, it’s no wonder cybersercurity and IT professionals are relying on an ever expanding arsenal of new tools and technologies. A recent survey revealed that nearly 80% of organi…Read More Product Showcase: Acronis Cyber Protect
Look into the Certified Information Systems Security Professional (CISSP) official training course and walk away with a grasp of the topics covered in the CISSP Common Body of Knowledge (CBK). Hosted by an (ISC)² Authorized Instructor, the CISSP Webcas…Read More Webcast: Get a sneak peek inside the CISSP domains
Wwhat can security leaders do to make sure they’re prepared and hone their skills ahead of the next inevitable threat? Now, they can test themselves and their knowledge at a new website, The CISO Challenge. Launched by XDR provider Cynet, it aims to le…Read More New competition allows cybersecurity leaders to test their knowledge and skills
In this interview with Help Net Security, Adam Bennett, CEO at Red Piranha, discusses Extended Detection and Response and their flagship product – Crystal Eye XDR. We’ve been hearing a lot about XDR in the past year. What is it, and what se…Read More Crystal Eye XDR: Protect, detect and respond to threats from a single unified platform
Perhaps due to the nature of the position, the InfoSec leadership roles tend to be solitary ones. CISOs, or their equivalent decision-makers in organizations without the role, have so many constant drains on their attention – keeping their knowledge fr…Read More New community to gives cybersecurity leaders outside the Fortune 2000 a forum to collaborate
Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shif to a remote workforce model, cybersecurity threats have become increasingly complex and data security even more fragile. Companies ne…Read More How do I select a DLP solution for my business?
While there is not one exact industry wide definition, threat modeling can be summarized as a practice to proactively analyze the cyber security posture of a system or system of systems. Threat modeling can be conducted both in the design/development p…Read More What is threat modeling and why should you care?
Even the best-laid plans can go astray, but you can get your certification goals back on track for success. Every (ISC)² member started out by committing to and passing one of our certification exams. No matter which certification you choose, you’ll fi…Read More Free certification Exam Action Plan from (ISC)²
Digital rights management (DRM) is a method to protect copyrights for digital media. In a world where technology allows us to share and copy various media and files, it is important to prevent or restrict unauthorized modification or distribution. This…Read More How do I select a DRM solution for my business?