Category: News
Anatomy of an insider breach originating from a contractor’s laptop
Keith Siepel, IT Manager at Hydrotech, Inc., examines an advanced cyber-threat discovered by Darktrace on a customer’s network.Commando VM: The First of Its Kind Windows Offensive Distribution
For penetration testers looking for a stable and supported Linux testing platform, the industry agrees that Kali is the go-to platform. However, if you’d prefer to use Windows as an operating system, you may have noticed that a worthy platform2019: It’s Time to Kill the VPN
Anti-fraud security is a necessary priority for financial institutions. However, many organizations allow their internal security to fall to the wayside. A holistic security strategy must protect not just an institution’s brand and end users,What General Counsel Need to Do to Prepare for a Cyber Breach
General Counsel (GC) address myriad legal and business challenges, but none may be as harrowing as dealing with a cyber attack. Even before dealing with an incident, there is the stress of simply not knowing when a successful attack may occurConference RISK 2019 Serbia returns to Belgrade on the 29th of May 2019!
Reserve the date, as on the 29th of May 2019, conference RISK returns to Serbia. Be a part of the critically acclaimed event and expand your knowledge with presentations or network […]Utimaco: Secure Transactions with eIDAS
Under eIDAS, the EU aims to facilitate cross-border digital transactions and pave the way for a Digital Single Market. Qualified electronic signatures and seals play a decisive role with this goal. Thanks to eIDAS, users can obtain both as aWhat is Network Traffic Analysis (NTA)
Network Traffic Analysis (NTA) was first created and defined by Gartner as an emerging category of security solutions that use network communications as the foundational data source for detecting and investigating security threats and anomalousBeyondTrust a leader in the KuppingerCole 2019 Leadership Compass for PAM
by Kevin Franks | March 25, 2019 BeyondTrust is again a leader in the KuppingerCole 2019 Leadership Compass for Privileged Access Management. This in-depth report rates 20 vendors in the privileged access management5 Best CompTIA Security+ Study Guides
The CompTIA Security+ is highly valued by IT professionals and employers alike. This vendor-neutral certification is part of CompTIA’s “Core” family of certifications and one of its top credentials in terms of popularity. Together, theBehavioral Biometrics: Is It the Next MFA Standard?
If there is anything to be learned from 2017’s array of massive data breaches, it’s that single-password authentication is no longer enough to warrant security. Deloitte, one of the world’s...Load More