
Threat hunting
Top 10 Free Threat-Hunting Tools
Threat hunting is an alternative approach to dealing with cyber-attacks, compared to network security systems that include appliances such as firewalls that

Network security
How to build a successful continuous monitoring (CM) program
For years, continuous monitoring has been serving the IT industry regardless of the size of the businesses utilizing it. Historically, the ITIL programs feat

Penetration testing
Red Team Assessment Phases – Everything You Need to Know!
The antagonistic approach of a Red Team makes things challenging to an organization’s system, policies, anticipations and adaptations. These days, organizati

Phishing
Anti-phishing training vs. software: Does security awareness training work?
Due to the increasing advances in today's technology, endpoint protection, and security software solutions are becoming even better at protecting your data.

Penetration testing
Comparing Mobile & Web Application Penetration Testing
Pentesting mobile applications is quite different from pentesting web applications. Comparing the two processes lets us make better choices for our security

Incident response
The Best & Worst Practices of Incident Response
Introduction Incident response is often an impromptu security area — organizations don't think about it until an incident occurs. Your response to an inciden

Healthcare information security
Breach Notification Requirements for Healthcare Providers
The healthcare industry has so many data security regulations that it can become overwhelming. These regulations are developed and implemented at the local,

Incident response
9 Tips for Improving Your Incident Response Strategy
Introduction Incident response is a complex process involving many moving parts. Follow these suggestions to improve incident response across your organizati

Healthcare information security
Top 10 Ways Your Healthcare Organization May be Violating HIPAA and Not Know It
HIPAA legislation was established by the US Federal Government in 1996. These are rules and standards designed to protect the security and privacy of patient

Security awareness
Top 7 Tips to Secure Your Passwords
In our current world where technology is finding its way into all aspects of our life, it is important to understand how to properly protect yourself online

Security awareness
How to Avoid Becoming a Victim of the Next Global Cyber Attack
Wanna Cry's rampant spread across devices scattered across the globe, one of the largest global cyber-attacks in recent memory, not only held sensitive info