Loading...
January 09, 2020
Security leaders say they expect demand for talent to outstrip supply for at least the next several years. Your task: develop staffing plans that recognize that reality. Read more â¶
What is a false flag? How state-based hackers cover their tracks
How to fix insecure LDAP binds to prevent exposed Windows admin credentials
Review: How Fugue protects cloud assets
How to stop email spoofing of parked domains
Protocol analyzers: Who needs them, and how to choose one
Backdoors and Breaches incident response card game makes tabletop exercises fun
This brief examines the shortcomings of remote access VPN, and offers an alternative with Prisma Access by Palo Alto Networks. Read more â¶
False flags are a favorite technique of cyber attackers connected to Russian intelligence, but they don't have a monopoly on the practice. Read more â¶
DEALPOST
Set yourself up to pass Azure certification exams with these 4 courses. Read more â¶
Although Microsoft has a permanent fix on the way, it's possible that you're exposing domain admin account credentials in cleartext. Here's how to check for and solve that problem. Read more â¶
The Fugue platform fills a critical need, bringing infrastructure and security compliance protection to the cloud. Read more â¶
Publishing a DMARC record for unused domains is a good idea. Here's how. Read more â¶
Whether for an ad-hoc analysis of a problem or ongoing monitoring, a protocol analyzer can be a valuable tool for the security pro. Read more â¶
New Backdoors and Breaches card game makes it easy to build a random, realistic incident as part of a tabletop exercise. Read more â¶
There are numerous ways to equip branch offices with secure networking infrastructure. This brief looks at various strategies and introduces a new solution: Prisma Access by Palo Alto Networks. Read more â¶
© 2024