Today’s reality is that security breaches are a given. Sophisticated attackers are too numerous and too determined to get caught by perimeter defenses. It’s relatively easy to take advantage of vulnerabilities on the edge of the network or trick a user…Read More 2020 threat landscape: See what evaded perimeter defenses
Active Directory is central for many companies and used to authorize access at almost every level. Due to its popularity and importance, AD is a perfect target for ‘bad actors.’ A security vulnerability could compromise an entire network infrastructure…Read More eBook: Active Directory Security Tips From the Experts
Microsoft late Thursday acknowledged a severe security vulnerability in the Print Spooler utility that ships by default on Windows and warned that the bug exposes users to computer takeover attacks.
Windows network administrators are scrambling to contain the fallout from the release of proof-of-concept code for a nasty Windows Print Spooler vulnerability that exposes Windows servers to remote code execution attacks.
Managing the security of your third parties is crucial, but security assessments are riddled with problems, including a lack of context, scalability and relevance. How can you build an effective process? In this comprehensive guide, we provide the dire…Read More Download: The CISO’s Guide to Third-Party Security Management
Cyber attacks are becoming a day-to-day struggle for businesses with the average cost of a breach estimated at $3.8M by the Ponemon Institute. Trends such as ransomware and the rapid acceleration of digital transformation are causing security conscious…Read More On-demand webinar: Demystifying MDR for security conscious buyers
Google’s ongoing struggles with in-the-wild zero-day attacks against its flagship Chrome browser isn’t going away anytime soon.
Following a major software supply chain compromise that exposed data for several major companies, developer tools startup CodeCov plans to kill off the Bash Uploader tool that was responsible for the breach.
Edge security and content delivery giant Akamai Technologies has tapped Boaz Gelbord to lead its cybersecurity program.
Look into the Certified Information Systems Security Professional (CISSP) official training course and walk away with a grasp of the topics covered in the CISSP Common Body of Knowledge (CBK). Hosted by an (ISC)² Authorized Instructor, the CISSP Webcas…Read More Webcast: Get a sneak peek inside the CISSP domains
The digitalization of services and expansion of remote working has heightened the number of off-premises users accessing cloud-based resources from their mobile device. In this configuration, each mobile device represents a point of entry for hackers, …Read More Whitepaper – EDR to secure mobile devices: Coverage, limits & recommendations
Even the best-laid plans can go astray, but you can get your certification goals back on track for success. Every (ISC)² member started out by committing to and passing one of our certification exams. No matter which certification you choose, you’ll fi…Read More Free certification Exam Action Plan from (ISC)²