Date | Title | Description |
14.06.2025 | So... You Want to Become a Penetration Tester? | Cybersecurity is a rapidly growing and evolving field with a wide range of subfields and specializations. One of these is penetration testing, a discipline within what's known as "red teaming," which seeks to actively find and exp... |
11.06.2025 | ‘Generative AI helps us bend time’: CrowdStrike, Nvidia embed real-time LLM defense, changing how enterprises secure AI | Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more
Generative AI adoption has surged by 187% over the past two years. But at the same... |
06.03.2025 | Bridging the AI Training Gap: A Call to Action for Organizations | In the rapidly evolving landscape of artificial intelligence (AI), a chasm is forming between leadership confidence and employee readiness. A recent report from Corndel reveals a startling disconnect. While leaders exude confidence in their... |
04.03.2025 | Over half of organizations experience incidents involving industrial control or operational tech | Over the past year, more than 50 percent of organizations have experienced at least one security incident involving ICS/OT systems. Among the top vulnerabilities exploited are internet-accessible devices (33 percent) and transient devices (... |
26.01.2025 | Initial Access для Red Team — Как войти без приглашения | Введение
Новый год – всегда дает импульс для творчества. Просматривая свои заметки, огромное количество закладок в браузере и сохраненных курсов, мне захотелось подготовить цикл статей, посвященных тематике получения первоначального доступа... |
06.01.2025 | Хакерские утилиты Дидье Стивенса | Дидье Стивенс — бельгийский разработчик и авторитетный специалист по информационной безопасности. Наиболее известен своими инструментами по взлому паролей Windows, анализу документов PDF и внедрению туда вредоносных файлов, а также как авто... |
14.12.2024 | The Cybersecurity Crucible: Manufacturing Under Siege | In the age of digital transformation, manufacturing stands at a crossroads. The industry is a vital cog in the global economy, yet it faces relentless cyber threats. The stakes are high. Cybercriminals see manufacturing as a treasure trove,... |
13.12.2024 | The imperative of cybersecurity in manufacturing | As a cybersecurity expert specialising in non-standard forensics and incident response, it's important to shed light on the pressing cybersecurity challenges facing the manufacturing sector and offer actionable strategies to mitigate these ... |
12.12.2024 | MOXFIVE Hires Chris Brewer to Lead Digital Forensics and Incident Response (DFIR) Team | Chris Brewer, MOXFIVE, Managing Director of Digital Forensics and Incident Response
Brewer to expand team and further enhance MOXFIVE's DFIR capabilities
WASHINGTON, Dec. 12, 2024 /PRNewswire-PRWeb/ -- MOXFIVE, a cybersecurity company speci... |
04.12.2024 | Stretching the SOC’s ability to cover more threats | A key trend in security operations over the last 18 months is the focus on 'doing more with less'. This continues today, and while the challenge is not unique to security - identical pressures are being felt in many other technology subdoma... |
24.09.2024 | Nearly half of security pros see AI as top threat, survey finds | HackerOne has disclosed preliminary findings from its survey of 500 security professionals ahead of the release of its Annual Hacker-Powered Security Report.
The data reveals that 48% of respondents consider artificial intelligence (AI) to ... |
20.09.2024 | HackerOne: Nearly Half of Security Professionals Believe AI Is Risky | A recent survey of 500 security professionals by HackerOne, a security research platform, found that 48% believe AI poses the most significant security risk to their organization. Among their greatest concerns related to AI include:
Leaked ... |
19.09.2024 | Top Cybersecurity Courses Online You Should Take in 2024 in Australia | Share
Tweet
Share
Share
Email
As we continue to advance in the digital age, the importance of cybersecurity cannot be overstated. In 2024, safeguarding digital assets has become a top priority for both individuals and organizations. The fre... |
13.09.2024 | В Великобритании 17-летнего подростка арестовали за кибератаку на транспортное управление Лондона | Национальное агентство по борьбе с преступностью Великобритании арестовало 17-летнего подростка, подозреваемого в причастности к кибератаке на городское транспортное агентство Transport for London.
«17-летний юноша был задержан по подозрени... |
04.09.2024 | Iran Cyber Attack: Fox Kitten Facilitates Ransomware in US | A new joint cybersecurity advisory from the Federal Bureau of Investigation, the Cybersecurity and Infrastructure Security Agency, and the Department of Defense Cyber Crime Center exposed new information about the infamous Iran-based threat... |
14.08.2024 | Mark Your Calendars for Cybersecurity Career Week: October 14-19 | Credit: NICE
Time to Start Planning!
Cybersecurity Career Week
October 14-19, 2024
nist.gov/nice/ccw
#ChooseCyber
Cybersecurity Career Week is a campaign to promote the discovery of cybersecurity careers and share resources that increase th... |
14.08.2024 | Что написать в стратегию ИБ крупного частного бизнеса | Введение
Привет! Меня зовут Данила, и я занимаюсь менеджментом, рисками и всем тем, что называют бумажной безопасностью.
Любой крупный бизнес рано или поздно задумывается о написании стратегии своего развития. Если вы CISO такой компании, т... |
14.08.2024 | Craig Newmark Philanthropies Awards $250,000 Grant to Support Women in CyberSecurity (WiCyS) | WiCyS Security Training Scholarship
New Grant Enhances Security Training Scholarship Program with AI Component and Military Track to Continue Boosting Cybersecurity Education and Diversity
COOKEVILLE, Tenn., Aug. 14, 2024 /PRNewswire-PRWeb/... |
10.08.2024 | Как защититься от мошенников, если у них появились ваши личные данные | По данным Identity Theft Resource Center, в первой половине 2024 г. более миллиарда человек стали жертвами утечки информации из сети, что почти на 500% больше, чем за тот же период 2023 г, сообщает CNBC. Майкл Брюммер, глава глобального отд... |
06.08.2024 | Women in CyberSecurity (WiCyS) Announces 5th Annual Security Training Scholarship | WiCyS Security Training Scholarship
Women in CyberSecurity (WiCyS) is proud to announce the 5th annual Security Training Scholarship (STS) Program in partnership with the SANS Institute. This initiative, made possible by WiCyS Tier 1 Partne... |
08.07.2024 | Industrial Cyber Security Basics Can Help Protect APAC Operational Technology Operators: Dragos | Industrial cyber security in APAC is still lagging behind enterprises, but having some basic hygiene and a plan in place is “light years” better than nothing, according to director of incident response at operational technology cyber securi... |
17.06.2024 | ECSF — европейская система навыков кибербезопасности | Завершая небольшую серию материалов о моделях компетенций в ИБ, нельзя не рассказать о самой молодой и компактной из них — ECSF, впервые представленной на 1-й конференции ENISA по кибернавыкам в сентябре 2022 года. ECSF обобщает роли, связа... |
21.05.2024 | SANS Institute Hails Vorlon as Impressive Solution for Third-Party API Security | Vorlon announces that the SANS Institute has released its First Look report and is now available for download.
SANS Institute Hails Vorlon as Impressive Solution for Third-Party API Security Visibility, Compliance, Threat Detection and Resp... |
16.04.2024 | OffSec Names Applied Technology Academy Exclusive Black Hat USA Training Partner | Applied Technology Academy elevates on-site cybersecurity training by teaching three highly sought-after OffSec courses: PEN-200 (OSCP), SOC-200 (OSDA) and EXP-401 (OSEE)
NEW YORK, April 16, 2024 /PRNewswire/ -- OffSec, the leader in contin... |
09.04.2024 | Google injects generative AI into its cloud security tools | At its annual Cloud Next conference in Las Vegas, Google on Tuesday introduced new cloud-based security products and services — in addition to updates to existing products and services — aimed at customers managing large, multi-tenant corpo... |
23.03.2024 | Ali Haider: The AI Odyssey of Cybersecurity | Share
Tweet
Share
Share
Email
By Anastasios Arampatzis
Ali Haider is an industry-recognized cybersecurity judge, mentor, and international award winner. He has traversed various regions, including the Middle East, Europe, and the United Sta... |
20.03.2024 | BlackBerry Partners with Rogers Cybersecure Catalyst at Toronto Metropolitan University To Bolster Cybersecurity Skills in Malaysia | New cybersecurity leadership program to be offered under the BlackBerry Cybersecurity Center of Excellence (CCoE) in Kuala Lumpur, with full-tuition scholarships available for women
CYBERJAYA, Malaysia, March 19, 2024 /PRNewswire/ -- BlackB... |
08.03.2024 | UPDATE - Carahsoft Sponsors Inaugural Billington State and Local Cybersecurity Summit at the National Press Club in Washington D.C. on March 19-20, 2024 | RESTON, Va., March 08, 2024 (GLOBE NEWSWIRE) -- Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, will be joined by more than 30 of its technology providers at the inaugural Billington State and Local Cybersecurity ... |
05.03.2024 | White House's Data Sale Ban Criticized for Limited Impact | Mayank Sharma , Tech Times 05 March 2024, 08:03 am
(Photo : (Photo by Alex Wong/Getty Images))
The White House's recent executive order banning the sale of sensitive personal data to "countries of concern" has been criticized by p... |
22.02.2024 | BlackBerry and SANS Institute Partner to Bolster Cybersecurity Skills in Malaysia | The New BlackBerry Cybersecurity Center of Excellence (CCoE) will offer SANS training courses to help grow and upskill cyber workforces across the country and the Indo-Pacific region
KUALA LUMPUR, Malaysia, Feb. 22, 2024 /PRNewswire/ -- Bla... |
14.02.2024 | The importance of security training in the zero trust era | Momentum for zero trust migration is accelerating across the cybersecurity community. It was a fundamental component of the Biden Administration’s 2023 National Security Strategy. Nearly 90% of global organizations have already started impl... |
15.01.2024 | AI and policy leaders debate web of effective altruism in AI security | The AI Beat | Last month, I reported on the widening web of connections between the effective altruism (EA) movement and AI security policy circles — from top AI startups like Anthropic to DC think tanks like RAND Corporation. These are linking EA, with ... |
04.11.2023 | А был ли баг? Может бага и не было? Зачем, как и чем тестировать PHP код | В статье рассмотрим основные подходы к тестированию бэкенда на PHP, обсудим преимущества и проблемы, связанные с этим процессом. Также узнаем о методах обнаружения и устранения багов, инструментах и книгах для более глубокого изучения тести... |
02.11.2023 | Будь что будет, или как я получила сертификат GCFA | Лада Антипова, специалист по киберкриминалистике Angara SOC, совсем недавно поделилась отличными новостями - сдала свой первый экзамен на сертификат международного уровня – GIAC Certified Forensic Analyst (GCFA). В материале рассказала, как... |
06.10.2023 | Twenty years of software updates | In the beginning, software ran mostly on a smart server dumb terminal networked or entirely on a local machine. If there was a defect, it was that the given program wouldn’t run. Once desktops, laptops, mobile phones and even physical devic... |
09.08.2023 | Global Leader in Cyber Security Training returns to Las Vegas at SANS Network Security Event | This event serves as a resounding call to action for all security professionals to elevate their skills, foster connections, and take the lead in the crucial mission of fortifying our increasingly digital world.
BETHESDA, Md. (PRWEB) August... |
08.08.2023 | Securing The Future: Embracing Cloud-Centric Cybersecurity Strategies | Oritse J. Uku is VP, Business Information Security Officer & Information Risk Management at Northwestern Mutual. Follow on LinkedIn. |
03.08.2023 | The Four Types Of Tools To Help Your Attack Surface Management Team | John Bruggeman, CISSP, is a consulting chief information security officer (CISO) for CBTS, an MSP and MSSP. |
24.07.2023 | Cloud Security’s Premier Gathering: SANS Institute's Second Annual Cloud Security Exchange featuring AWS, Google Cloud, & Microsoft Azure Set for August 18, 2023 | The Cloud Security Exchange will delve into the latest trends and practices in cloud security architecture and threat detection, with a focus on implementation best practices. Participants can learn from real-world cases and successful stra... |
20.07.2023 | Akamai Survey: API-Specific Controls are Lacking | Image: adam121/Adobe Stock
Content delivery, security and cloud services company Akamai, in partnership with U.S. cybersecurity training company SANS Institute, released on Tuesday the results of a new study examining the most worrisome sec... |
13.07.2023 | Top Tech Conferences & Events to Add to Your Calendar in 2023 | Image: Anton Gvozdikov/Adobe Stock
Conferences and expos are alive and well in 2023. Many tech events are back to being in person; there is also a mix of hybrid and virtual-only events, so there are plenty of options.
Here is a comprehensiv... |
04.07.2023 | 200+ подкастов про информационную безопасность и хакерские атаки | Привет! Мы решили сделать для вас подборку ИБ-подкастов. Это аудиоконтент с различными шоу и экспертными интервью, которые помогут прокачать профессиональные навыки, узнать последние новости, сориентироваться в индустрии и заодно прокачать ... |
30.06.2023 | Aqua Security Study Finds 1,400% Increase in Memory Attacks | Image: tippapatt/Adobe Stock
Threat actors are honing their focus on exploits that evade detection and remain unnoticed within systems, according to Aqua Security’s 2023 Cloud Native Threat Report, which examined memory attacks in networks ... |
15.06.2023 | Recharge Your Cybersecurity Skills and Learn to Combat Tomorrow's New Challenges at SANSFIRE - JULY 10–15 | BETHESDA, Md. (PRWEB) June 15, 2023
SANS Institute, the global leader in cybersecurity training and education, proudly presents SANSFIRE 2023, taking place from July 10-15. This extraordinary event arms you with the latest strategies to con... |
26.04.2023 | Advancing The Security Operations Center (SOC): New Technologies and Processes Can Help Mitigate Cyber Threats | In the System Monitoring Room Two Senior Operators Work on a Big Interactive Map. Facility is Full ... [+] of Screens Showing Technical Data.getty |
14.04.2023 | TikTok ban could weaken personal cybersecurity | TikTok is not the first app to be scrutinised over the potential exposure of US user data but it is the first widely used app that the US government has proposed banning over privacy and security concerns.
So far, the discussion has focused... |
10.03.2023 | Navigating Salesforce Threats: Your Largest Container of Data | Customer records, financial information, personally identifiable information (PII) — Salesforce is the virtual motherlode of data prized by cybercriminals. To properly guard your Salesforce data, you must be on the lookout for potential thr... |
20.02.2023 | SANS Institute Launches New Cybersecurity Training for IT Administrators | SANS Security Awareness, a division of the SANS Institute, is proud to announce the launch of its new short-form technical training modules, “Security Essentials for IT Administrators.” This series provides a comprehensive review of cyberse... |
18.02.2023 | Расследуем инциденты в дампе оперативной памяти Windows (GrrCon2016) | Подготовка.
Хорошо подготовленный стенд – залог успеха в расследовании и анализе, поэтому начинаем с этапа подготовки. Установим ОС с уже необходимыми утилитами для расследования компьютерных инцидентов: SIFT (от института SANS, используйте... |
16.02.2023 | Benchmarking your cybersecurity budget in 2023 | Knowing which areas to focus on in a cybersecurity budget to drive the most significant business value is a must-have skill for CISOs.
Deloitte recently found that cybersecurity is core to cloud-based digital transformation, accounting for ... |
14.02.2023 | Coro’s Mythbuster Series—Myth No. 6: Creating A Security-Aware Culture Isn’t Necessary For SMBs | Cofounder and chief marketing officer at Coro. |
14.02.2023 | Connected device vendors devote more effort to security and safety | More and more connected systems are being used to deliver the essentials of our everyday lives. From the water and power that comes into our homes to the medical treatment we receive, the 'Extended Internet of Things' (XIoT) is involved.
A ... |
09.12.2022 | How a recession will change the cybersecurity landscape | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.
Few words strike as much fear into security leaders as “... |
07.12.2022 | 4 cybersecurity predictions for 2023 — SANS analysts look ahead | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.
After a year of cyber war, geopolitical conflict and unr... |
05.12.2022 | Balancing the risks and benefits of an online presence [Q&A] | The widespread use of digital platforms allows businesses to expand, but at the same time a growing internet presence can put organizations at risk in ways they cannot plan for.
We talked to Censys' data scientist, Emily Austin about the co... |
30.11.2022 | How Honeywell is bridging gaps in legacy OT, IT and industrial control systems for manufacturers | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.
Bad actors target manufacturing, processing plants and u... |
29.11.2022 | 20+ хакерских операционных систем для атаки и защиты | На этот раз речь о различных десктопных Linux-дистрибутивах, но найдется место и Android, и даже Windows.
Большинство хакерских ОС отчасти похожи на подборки узкоспециализированных утилит, которые я уже выкладывал. Они представляют собой го... |
25.11.2022 | ‘Quiet quitting’ poses a cybersecurity risk that calls for a shift in workplace culture | Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.
Are your employees mentally checked out from their posit... |
13.11.2022 | Привет Emotet! Исследуем дамп оперативной памяти заражённый Emotet | Всем привет, как я обещал в первой части статьи «Привет Emotet!», в следующей статье мы приступим к расследованию инцидента в дампе оперативной памяти и заодно пройдём задание от cyberdefenders.org ответив на 10 несложных вопросов, а также ... |
09.11.2022 | SANS, Google Cloud and Palo Alto Networks Collaborate with Cyversity to Launch Global Cyber Diversity Academy | “This program will bring new cybersecurity professionals into the workforce with the practical skills and knowledge needed to make our world a safer place,” said Max Shuftan, Director, Mission Programs & Partnerships, SANS.
NEW YORK (PR... |
03.11.2022 | Skills Shortage Threatens Cloud Security | CEO and cofounder of Ermetic, a provider of public cloud security technology for AWS, Azure and Google Cloud infrastructures. |
01.11.2022 | Как и чем отвечать на атаки: мнение лида группы реагирования
Стадии реагирования на инцидент
Финальный этап реагирования или зачем это все нужно
Как повысить безопасность... | «Если не можете расшифровать наши данные, то зачем вы здесь?», — примерно так порой реагируют на приезд нашей команды. Сейчас все объясню, а заодно:
распишу, на какие стадии делится реагирование на инциденты, и как они выглядят на практике;... |
22.10.2022 | Cloud security is complex -- but most vulnerabilities fall into three key categories | With most enterprises leveraging at least one type of cloud deployment today, the question arises: is the cloud more or less secure than on-premise solutions?
The reality is that for on prem or even private cloud environments, the approach ... |
31.08.2022 | XDR vs. MDR: How to pick the right one for your security needs | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
With the rise in complex cyberattacks and an evolving cyberthreat landscape, tools that detect attackers and secure int... |
19.08.2022 | 10 top cybersecurity online courses and certifications in 2022 | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Table of contents
What is a cybersecurity online course/certification?
Key must-have course programs and trainings for ... |
02.08.2022 | CyberSN Partner, Secure Diversity, Launches Scholarship Campaign to Train Historically Excluded Genders in Cybersecurity | Secure Diversity and the SANS Institute partner to create a training and certification program to to educate current and future cybersecurity professionals. BOSTON, MASSACHUSETTS, UNITED STATES, August 2, 2022 /EINPresswire.com/ -- CyberSN,... |
02.08.2022 | Microsoft goes all-in on threat intelligence and launches two new products | Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.
Today’s threat landscape is an unforgiving place. With 1,862 publicly disclosed data breaches in 2021, security teams a... |
21.07.2022 | Тестировщики, архитекторы и охотники — топ-лист киберпрофессий от института SANS | В 2019 году Всемирный экономический форум (ВЭФ) назвал кибератаки четвёртой по значимости глобальной проблемой для человечества. Спрос в мире на специалистов в области кибербезопасности растёт, так же как и количество незанятых вакансий в э... |
19.07.2022 | Blockchain Security Firm Halborn Raises $90M Series A Led by Summit Partners | Miami, FL - Halborn, a cybersecurity firm serving both traditional finance and blockchain-based clients, announced the completion of a $90 million growth equity financing, the first external funding in the company's history. Global growth i... |
21.06.2022 | Egnyte and SANS Institute Initiate Cybersecurity Scholarship to Support HBCU Students | MOUNTAIN VIEW, Calif. and BETHESDA, Md. (PRWEB) June 21, 2022
Egnyte, a leader in cloud content security and governance, and SANS Institute, the global leader in cybersecurity training and certifications, today announced a cybersecurity sch... |
12.06.2022 | Взять и погрузиться в DevSecOps — книги, вебинар и другие ресурсы, которые помогут сделать это | Мы продолжаем рассказывать о полезных ресурсах для ИТ-специалистов. В прошлый раз составили подборку для системных администраторов, сегодня — для специалистов, занимающихся автоматизацией разработки безопасных приложений. В список попали те... |
02.06.2022 | Airgap Ransomware Early Detection™ Fortifies the Network Security Perimeter | Airgap Networks, Inc. "Detect Ransomware IOCs with confidence, Zero Trust isolate all endpoints with granular segmentation, and prevent ransomware spread with surgical precision."
SANTA CLARA, Calif. (PRWEB) June 02, 2022
Airgaps ... |
27.05.2022 | Безопасность + Разработка = ♡ Как выпускать релизы в срок и дружить с безопасностью | В идеальном мире команды безопасности — это компетентные специалисты, которые занимаются анализом рисков, моделированием угроз, защитой от целевых атак, расследованием инцидентов и другой важной работой. В том же идеальном мире разработчики... |
18.05.2022 | Unlocking the hidden resources that could solve the cyber skills crisis [Q&A] | There was already a shortage of cyber skills before the COVID-19 pandemic hit, and since then we've had a perfect storm of home working and the Great Resignation to make things worse still.
But is there an unexploited resource out there tha... |
08.05.2022 | Эмуляция противника и Red Teaming | Часть 1
Эмуляторы противника создают сценарий для проверки определенных аспектов тактики, методов и процедур противника (TTP). Затем красная команда следует сценарию, работая в целевой сети, чтобы проверить, как защита может работать против... |
19.04.2022 | Fortress Information Security receives $125M to find the answer to supply chain attacks | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Today, supply chain cybersecurity platform provid... |
06.04.2022 | Risk-Based Security Keeps Businesses Grounded When Migrating To The Cloud | Co-founder and CEO at Vulcan Cyber. |
01.04.2022 | Cyber Hollywood: Onscreen vs. reality | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - August 3. Join AI and data leaders for insightful talks and exciting networking opportunities. Learn more about Transform 2022
Television and movies have ... |
01.04.2022 | Cyber Hollywood: Onscreen vs. reality | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Television and movies have an impact on how we se... |
18.03.2022 | How to become a cybersecurity pro: A cheat sheet | Image: Mackenzie Burke
As cybercriminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are 3.5 million unfilled cybersecurity jobs worldwide, according... |
15.03.2022 | Part 1: ‘You have got to have the hunger. Digital forensics is not just what I do, it's who I am’ | Jason Jordaan: certified SANS instructor and principal forensic analyst.
We met with certified SANS instructor and principal forensic analyst, Jason Jordaan, to get the top tips for moving into the digital forensics field. Whether you curre... |
04.03.2022 | 2022 tech conferences and events to add to your calendar | Image: kasto80/Getty Images/iStockphoto Must-read CXO coverage
Power BI vs. Tableau
ATS: The best applicant tracking systems
Apple, Microsoft top list of most ethical tech companies
How to hire an IoT Architect (TechRepublic Premium)
2020 w... |
22.02.2022 | 70+ бесплатных инструментов для компьютерной криминалистики (форензики) | Расследование инцидентов в области информационной безопасности не такая горячая тема, как пентесты, но эта научная и практическая дисциплина продолжает развиваться, во многом, благодаря Open Source сообществу.
Давайте пройдемся по просторам... |
19.01.2022 | BlackBerry : Kraken the Code on Prometheus | Kraken the Code on Prometheus
RESEARCH & INTELLIGENCE / 01.19.22 / The BlackBerry Research & Intelligence Team
Share on Twitter
Share on Facebook
Share on Linked In
Email
Executive Summary
The subscription-based malware service Prom... |
10.01.2022 | Capgemini : Partnering with Startups – risky business? | In our latest series of blogs and vlogs, Capgemini Ventures is looking at the role of startups in transformation and value creation - and for any partnership to be successful, the importance of risk management can't be underestimated. So, w... |
08.12.2021 | AWS outage shines a light on hybrid cloud | Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more
As the dust begins to settle on yet another cloud outage, chatter will once again center on th... |
08.12.2021 | AWS outage shines a light on hybrid cloud | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
As the dust begins to settle on yet another cloud... |
03.12.2021 | How AI and ML can thwart a cybersecurity threat no one talks about | We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. Register today!
Ransomware attackers rely on USB drives to delive... |
03.12.2021 | How AI and ML can thwart a cybersecurity threat no one talks about | Hear from CIOs, CTOs, and other C-level and senior execs on data and AI strategies at the Future of Work Summit this January 12, 2022. Learn more
Ransomware attackers rely on USB drives to deliver malware, jumping the air gap that all indus... |
22.10.2021 | The Importance Of Measuring Security Awareness | Sai Venkataraman is the CEO of SecurityAdvisor, the only personalized security awareness platform that quantifiably reduces security events. |
18.10.2021 | 2021 tech events, summits and conferences to add to your calendar | Image: iStock/metamorworks What's hot at TechRepublic
Power BI vs. Tableau: BI tools comparison
How to share your screen in Google Meet for macOS
Get lifetime access to Microsoft Office 2021 for just $50
One of the most beautiful and user f... |
06.10.2021 | On-Demand Webinar: SANS 2021 Top New Attacks and Threat Report – Panel Discussion | On-Demand Webinar: SANS 2021 Top New Attacks and Threat Report - Panel Discussion
WEBCASTS / 10.05.21 / Corporate Communications
Share on Twitter
Share on Facebook
Share on Linked In
Email
In the SANS 2021 Top New Attacks and Threat Report,... |
23.09.2021 | These 11 leaders were named the best in Maryland cybersecurity | The Cybersecurity Association of Maryland, Inc. (CAMI) announced the winners of the 2021 MD Cybersecurity Awards this week.
The 11 award winners were named on September 22 after a dozen judges deliberated about the 87 nominations received.
... |
08.09.2021 | Open Text : Three MDR strategies for government CISOs to quickly detect and respond to threats | The US President's Cybersecurity Executive Order, released in May 2021, outlines 'the persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American peopl... |
19.08.2021 | Secure Public Cloud Platforms With GIAC’s New Cyber Security Certification | With the widespread adoption of cloud computing technology in recent years, public cloud service providers are now part of most enterprises in some capacity. The big 3 – AWS, Azure, and GCP – are widely used across organizations, with each ... |
03.08.2021 | Expansion of SANS Cyber Workforce Academy Aims to Increase Diversity and Number of Skilled Cybersecurity Professionals in Maryland to Meet Regional Needs | In partnership with the Maryland Department of Labor’s EARN program, the SANS Institute announced the expansion of existing opportunities for Maryland Residents to reskill and for existing professionals to upskill into in-demand positions i... |
20.07.2021 | Two-for-Tuesday vulnerabilities send Windows and Linux users scrambling | Enlarge reader comments 116 with 71 posters participating
Share this story
Share on Facebook
Share on Twitter
Share on Reddit
The world woke up on Tuesday to two new vulnerabilities—one in Windows and the other in Linux—that allow hackers w... |
12.07.2021 | Anatomy of a Breach: Preventing the Next Advanced Attack | Your company's stock price nosedives by 15% in a single day. You get a flood of messages from concerned family and friends about your company. Your company's name is all over the news. Your colleagues exchange hundreds of frantic messages w... |
10.06.2021 | BLACKBERRY LIMITED
BlackBerry : Five Tips to Hire for Diversity in Cybersecurity | Five Tips to Hire for Diversity in Cybersecurity
CORPORATE / 06.09.21 / Corporate Communications
Share on Twitter
Share on Facebook
Share on Linked In
Email
June has long been an important month for the LGBTQ community. In 1969, the Stonewa... |
07.06.2021 | SPLUNK INC.
Splunk : EO, EO, It's Off to Work We Go! (Protecting Against the Threat of Ransomware with Splunk) | Share:
By Shannon Davis June 07, 2021
Authors and Contributors: As always, security at Splunk is a family business. Mick Baccio, James Brodsky, Tamara Chacon, Drew Church, Shannon Davis, Marcus LaFerrerra, Dave Herrald, Ryan Kovar and John ... |