Ransomware Prevention Special Report: How to Address a Pervasive and Unrelenting Threat
Ransomware is a fast-growing threat affecting thousands of government agencies and municipalities, and now it’s even targeting critical ICS/SCADA operations. Watch this on-demand webcast to learn from SANS’ Justin Henderson, who explains why and how ransomware is spreading, as well as introduces standards and provides guidance for detecting and recovering from ransomware based on US-CERT and NIST resources.
Read More
November 12, 2020
How to Build Security Use Cases for Your SIEM
If you’re anything like me, you create an itinerary when traveling to a new place for an extended period. You want to prepare for the conditions you will be in, plan for things you will need, and have a plan…
Read More
November 9, 2020
Cybersecurity Infographic: Succeeding as a CISO in 2020
Posted by: Kelsey Gast
CISOs are under tremendous pressure to deliver — our cybersecurity infographic will help security leaders stay informed on the latest industry trends and statistics in order to find success in 2020 and beyond. Don’t miss these key insights! Cybersecurity Infographic…
Read More
November 4, 2020
Extending DevSecOps Security Controls into the Cloud: A SANS Survey
Learn how to leverage best practices in DevSecOps in todays cloud-based environment and how to use the most effective tools and technologies in this webinar. This year’s survey continues to explore how organizations are extending their DevSecOps security controls beyond their on-premises environments into the public cloud to secure their cloud networks, services and applications.
Read More
October 30, 2020
Security Information and Event Management (SIEM) Solutions: Top Success Factors
The promise of Security Information and Event Management (SIEM) solutions is easy to grasp. They tie together your detection and monitoring systems, along with device logs, to give you a clear overview of alerts and security events. Realizing SIEM’s promise…
Read More
October 30, 2020
7 Ways CISOs Can Gain Board-Level Support
Posted by: Kelsey Gast
Chief information security officers (CISOs) have an important job of managing a healthy security posture in an organization — but achieving board-level support can be challenging. To receive proper funding, today’s modern CISO needs more than just a technical aptitude…
Read More
October 16, 2020
CISO Advice from CTO Roopangi Kadakia on Federal Cybersecurity
Posted by: Kelsey Gast
Federal cybersecurity challenges are universal and yet unique — every organization faces cyber risk, but the nuances can change based on the organization’s mission, size, customer data, and more. We reached out to Roopangi Kadakia to uncover the latest federal…
Read More
October 14, 2020
Maze Ransomware Deep Dive: Using Threat Research Reports and MITRE ATT&CK to Turn Analysis into Action with Maze as an Example
Watch this on-demand webcast to learn how to make threat research an actionable part of your security operations, using recent reporting on Maze ransomware as an example.
Read More
October 13, 2020
Automating Attestation: A Critical Step in Security Risk Management
In this panel, identity and security experts will provide real-world examples about the role of attestation processes in a security risk management program, the key stakeholders involved and how it can be achieved using technologies that may already be deployed.
Read More
October 9, 2020
Top 5 Reasons to Invest in an Automated Incident Response System
Posted by: Kelsey Gast
Automated incident response (IR) refers to the process and management for systemic response to a security breach. This method allows a security operations center (SOC) to respond to critical incidents in real time and to triage alarms more efficiently. Lack…
Read More
October 8, 2020
FDSIPs – Protecting Mission-Critical Networks at the Tip of the Spear
Posted by: Ryan Schradin
We’ve grown accustomed to the benefits and capabilities of having a powerful computer in our pockets. We’re increasingly dependent on devices that can interconnect and be controlled remotely. We’ve even begun to take the ability to communicate via text, voice,…
Read More
October 5, 2020
Prepare Your Team to Identify New Phishing Attack Techniques
Phishing attacks began decades ago as simple spam, designed to trick recipients into visiting sites and becoming customers, and has since morphed into a worldwide criminal industry. Centered on social engineering — manipulation through deception — phishing has become not…
Read More
October 2, 2020
What SOC Automation Tools Can Do for Your Team
Posted by: Matt Willems
Your analysts are efficient. They are creative problem solvers who prefer to spend their time putting those inventive skills to use rather than expending energy on mundane tasks. For example, logging into an active directory and unlocking a user account…
Read More
September 28, 2020
Telehealth: Keeping Critical Connections Secure
In 2019, more than 759 healthcare providers were hit with ransomware.[1] Meanwhile, 2020 showed us the necessity of creating new digital channels to enable critical care. Scrambling to keep patients and doctors connected, many healthcare organizations leveraged new telehealth capabilities…
Read More
September 14, 2020
Bank Negara of Malaysia’s Risk Management in Technology (RMiT)
Posted by: Kyle Dimitt
Are you in the financial services industry in Malaysia? If you are any of the following, you’ve probably heard of the Bank Negara of Malaysia’s Risk Management in Technology (RMiT) regulation that is applicable to: Licensed banks Licensed investment banks…
Read More
September 9, 2020
Putting Healthcare-Specific Threat Intelligence to Work
Healthcare organizations are a prime target for cyberattacks. The continuum of care makes for a complex and varied landscape of users, devices, applications, and workflows that attackers can use as entry points into the network. Attackers can also threaten the…
Read More
August 25, 2020
Buried Under an Avalanche of Medical Device “Special Snowflakes”
Posted by: Kevin A. McDonald
Embracing diversity in people, ideas, and lifestyles adds to a person’s life and can provide new ideas and drive innovation. But, diversity in medical devices adds complexities, costs, and increases the chances of errors. What can make each device a…
Read More
August 6, 2020
Top Cybersecurity Resources for Students and Professionals
With a steady increase in breaches and cyberthreats continually on the rise, the demand for skilled cybersecurity professionals is in high demand, making it a solid career choice. Whether you’re considering a new position in cybersecurity, or looking to enhance your…
Read More
August 3, 2020