Security Tips and Tricks

Ransomware Prevention Special Report: How to Address a Pervasive and Unrelenting Threat

Ransomware Prevention Special Report: How to Address a Pervasive and Unrelenting Threat

Ransomware is a fast-growing threat affecting thousands of government agencies and municipalities, and now it’s even targeting critical ICS/SCADA operations. Watch this on-demand webcast to learn from SANS’ Justin Henderson, who explains why and how ransomware is spreading, as well as introduces standards and provides guidance for detecting and recovering from ransomware based on US-CERT and NIST resources.

Read More
Map

How to Build Security Use Cases for Your SIEM

If you’re anything like me, you create an itinerary when traveling to a new place for an extended period. You want to prepare for the conditions you will be in, plan for things you will need, and have a plan…

Read More

Cybersecurity Infographic: Succeeding as a CISO in 2020

CISOs are under tremendous pressure to deliver — our cybersecurity infographic will help security leaders stay informed on the latest industry trends and statistics in order to find success in 2020 and beyond. Don’t miss these key insights! Cybersecurity Infographic…

Read More
Extending DevSecOps Security Controls into the Cloud: A SANS Survey

Extending DevSecOps Security Controls into the Cloud: A SANS Survey

Learn how to leverage best practices in DevSecOps in todays cloud-based environment and how to use the most effective tools and technologies in this webinar. This year’s survey continues to explore how organizations are extending their DevSecOps security controls beyond their on-premises environments into the public cloud to secure their cloud networks, services and applications.

Read More
Man sitting in front of desktop computer

Security Information and Event Management (SIEM) Solutions: Top Success Factors

The promise of Security Information and Event Management (SIEM) solutions is easy to grasp. They tie together your detection and monitoring systems, along with device logs, to give you a clear overview of alerts and security events. Realizing SIEM’s promise…

Read More
Man and woman having a board meeting

7 Ways CISOs Can Gain Board-Level Support

Chief information security officers (CISOs) have an important job of managing a healthy security posture in an organization — but achieving board-level support can be challenging. To receive proper funding, today’s modern CISO needs more than just a technical aptitude…

Read More
Roopangi Kadakia shares CISO advice for federal cybersecurity

CISO Advice from CTO Roopangi Kadakia on Federal Cybersecurity

Federal cybersecurity challenges are universal and yet unique — every organization faces cyber risk, but the nuances can change based on the organization’s mission, size, customer data, and more. We reached out to Roopangi Kadakia to uncover the latest federal…

Read More
Maze Ransomware Deep Dive: Using Threat Research Reports and MITRE ATT&CK to Turn Analysis into Action with Maze as an Example

Maze Ransomware Deep Dive: Using Threat Research Reports and MITRE ATT&CK to Turn Analysis into Action with Maze as an Example

Watch this on-demand webcast to learn how to make threat research an actionable part of your security operations, using recent reporting on Maze ransomware as an example.

Read More
Automating Attestation: A Critical Step in Security Risk Management

Automating Attestation: A Critical Step in Security Risk Management

In this panel, identity and security experts will provide real-world examples about the role of attestation processes in a security risk management program, the key stakeholders involved and how it can be achieved using technologies that may already be deployed.

Read More
SOC team working with Automated Incident Response tool on their computers.

Top 5 Reasons to Invest in an Automated Incident Response System

Automated incident response (IR) refers to the process and management for systemic response to a security breach. This method allows a security operations center (SOC) to respond to critical incidents in real time and to triage alarms more efficiently. Lack…

Read More
Military Cybersecurity

FDSIPs – Protecting Mission-Critical Networks at the Tip of the Spear

We’ve grown accustomed to the benefits and capabilities of having a powerful computer in our pockets. We’re increasingly dependent on devices that can interconnect and be controlled remotely. We’ve even begun to take the ability to communicate via text, voice,…

Read More
Phishing hooks grabbing user information

Prepare Your Team to Identify New Phishing Attack Techniques

Phishing attacks began decades ago as simple spam, designed to trick recipients into visiting sites and becoming customers, and has since morphed into a worldwide criminal industry. Centered on social engineering — manipulation through deception — phishing has become not…

Read More
Security operation center (SOC) team working in the office

What SOC Automation Tools Can Do for Your Team

Your analysts are efficient. They are creative problem solvers who prefer to spend their time putting those inventive skills to use rather than expending energy on mundane tasks. For example, logging into an active directory and unlocking a user account…

Read More
Securing Telehealth Systems

Telehealth: Keeping Critical Connections Secure

In 2019, more than 759 healthcare providers were hit with ransomware.[1] Meanwhile, 2020 showed us the necessity of creating new digital channels to enable critical care. Scrambling to keep patients and doctors connected, many healthcare organizations leveraged new telehealth capabilities…

Read More
Manage Risk and Compliance in Malaysia’s Financial Industry

Bank Negara of Malaysia’s Risk Management in Technology (RMiT)

Are you in the financial services industry in Malaysia? If you are any of the following, you’ve probably heard of the Bank Negara of Malaysia’s Risk Management in Technology (RMiT) regulation that is applicable to: Licensed banks Licensed investment banks…

Read More
Doctor sitting behind a laptop computer

Putting Healthcare-Specific Threat Intelligence to Work

Healthcare organizations are a prime target for cyberattacks. The continuum of care makes for a complex and varied landscape of users, devices, applications, and workflows that attackers can use as entry points into the network. Attackers can also threaten the…

Read More
Medical Device Cybersecurity

Buried Under an Avalanche of Medical Device “Special Snowflakes”

Embracing diversity in people, ideas, and lifestyles adds to a person’s life and can provide new ideas and drive innovation. But, diversity in medical devices adds complexities, costs, and increases the chances of errors. What can make each device a…

Read More
Cybersecurity Resources Center

Top Cybersecurity Resources for Students and Professionals

With a steady increase in breaches and cyberthreats continually on the rise, the demand for skilled cybersecurity professionals is in high demand, making it a solid career choice. Whether you’re considering a new position in cybersecurity, or looking to enhance your…

Read More