Yearly Archives :

2017

Malware Analyst

Malware Analyst – The Bomb Squad

Malware Analyst – The Bomb Squad 864 486 N2K

Updated April 8th, 2020 What Does It Mean To Be A Malware Analyst? Imagine the detonation of an explosive digital…

read more
The great password debate part 3

The Great Password Debate Part 3 – Where we disagree about password resets and failures

The Great Password Debate Part 3 – Where we disagree about password resets and failures 864 486 N2K

“This post is part three of our reaction to new recommendations in the National Institute of Standards’ Digital Identity Guidelines…

read more

The Value of Cybersecurity Tabletop Exercises for Leadership Teams

The Value of Cybersecurity Tabletop Exercises for Leadership Teams 864 486 N2K

The lessons learned from cybersecurity tabletop exercises will minimize the impact of your organization’s next data breach. If the adage…

read more
Vulnerability Mgt Analyst

Vulnerability Management Analyst – The EMT

Vulnerability Management Analyst – The EMT 864 486 N2K

Updated April 8th, 2020 What does it mean to be a Vulnerability Management Analyst? The cliche, “You are only as…

read more

How to Calculate ROI on Cybersecurity Investment

How to Calculate ROI on Cybersecurity Investment 864 486 N2K

By Tom Kellermann, CEO, Strategic Cyber Ventures As a Chief Information Security Officer, you have the unenviable responsibility of presenting…

read more

The Farmer and the Equifax

The Farmer and the Equifax 727 409 N2K

The Farmer and the Equifax In the wake of the Equifax consumer data breach, many of the stories in the past days share…

read more

How Not To Be One of the Six Million Instagram Hacked Accounts

How Not To Be One of the Six Million Instagram Hacked Accounts 864 486 N2K

How Not To Be One of Six Million Instagram Hacked Accounts What Happened? Instagram, social media’s beloved photo and video…

read more
Threat Hunter

Threat Hunter – The Tracker

Threat Hunter – The Tracker 864 486 N2K

Updated April 8th, 2020 What does it mean to be a Threat Hunter? With newsworthy breaches occurring nearly on a…

read more

Why Corporate Leaders Should Follow China's Five Year Plan: Part 4

Why Corporate Leaders Should Follow China's Five Year Plan: Part 4 864 486 N2K

Why Corporate Leaders Should Read China’s Five Year Plan Welcome back to our series on the ties between corporate security…

read more
Penetration Tester

Penetration Tester: The Secret Agent

Penetration Tester: The Secret Agent 864 486 N2K

Updated April 8th, 2020 What does it mean to be a Penetration Tester? Do you ever wonder how threat actors…

read more