Industry insights July 24, 2022 Drew Robb Two basic actions that reduce enterprise cyber risk by 60% Recent events have increased the likelihood of at cyber-attacks against critical infrastructure. Here are two things to reduce your risk.
MITRE ATT&CK™ July 22, 2022 Louis Livingston-Garcia How to use the MITRE ATT&CK Matrix for Enterprise: Video walkthrough Learn how to effectively use the MITRE ATT&CK matrix and develop your and your security team’s cybersecurity skills.
Industry insights July 22, 2022 Keatron Evans 4 key takeaways from the 2022 Verizon DBIR report Here's what cybersecurity professionals need to know about the latest version of the Verizon Data Breach Investigations Report (DBIR).
General security July 21, 2022 Gilad Maayan A DevSecOps process for ransomware prevention Ransomware is possibly the most severe cybersecurity threat facing organizations today. There are multiple attack vectors. One of the ways ransomware infects...
Professional development July 21, 2022 John Bandler How to learn and pass your next certification exam What do you want to learn next? Where do you want to be in the next six months or year? Use these learning tips to help hit your goals.
Professional development July 21, 2022 Infosec Mission accomplished: How one army veteran turned neurobiologist moved into cybersecurity Since training with VetsinTech and Infosec, Tom earned his Security+ and AWS Cloud certifications and landed a security engineer role at Caterpillar.
Vulnerabilities July 20, 2022 Pedro Tavares How criminals are taking advantage of Log4shell vulnerability This article will break down the modus operandi of the Log4shell vulnerability
Application security July 20, 2022 Isla Sibanda API Security: How to take a layered approach to protect your data Learn how a layered approach to API security can help organizations balance cost and efficacy.
SOC analyst July 19, 2022 Dan Virgillito SOC analyst salary: Entry, mid and senior analysts’ earnings in 2022 A security operations center (SOC) analyst’s job is to monitor an organization’s IT infrastructure for potential threats. These professionals usually work...
News July 18, 2022 Ryan Miner Cybersecurity Weekly: AiTM phishing attack, how to spot social engineering personas, CISA patch order A new AiTM phishing attack can skip MFA, scammers posing as cybersecurity companies to install malware, and how to spot fake personas used for social engineering....