November 29, 2019
Being an interim or virtual CISO (vCISO) comes with many of the same demands of permanent security leadership roles, but also has its own unique challenges and rewards. Read more â¶
6 top OSINT tools: Find sensitive public info before hackers do
How to build a Windows disaster recovery toolkit
5 steps to a successful red team engagement
How a bank got hacked
Emergent Android banking Trojan shows app overlay attacks are still effective
How to lock down enterprise web browsers
Enterprises are increasingly being asked to improve security protection while simultaneously maintaining business and network performance. To address this, host-based segmentation is increasing in adoption. Read more â¶
Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more â¶
DEALPOST
This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more â¶
Sooner or later, a security incident will shut down or disrupt your network. You'll be better prepared with these items in your disaster recovery toolkit. Read more â¶
You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how. Read more â¶
Notorious hacker Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank. Here's how he did it and why it's cause for concern. Read more â¶
By taking code from another Android Trojan, Anubis, the Ginp malware has enhanced itself and has begun targeting banks. Read more â¶
Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately. Read more â¶
Security segmentation reduces your attack surface and prevents the spread of breaches inside your data center and cloud environments. Read more â¶