SANS Top New Attacks and Threat Report
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
Historically, security managers had the challenge of convincing C-Suite leaders and boards of directors of existing or potential threats. While those days are not necessarily long-gone, the persistence of ransomware …
Blocking against all phishing attempts is costly, time intensive and arguably impossible. This paper will discuss how to get ahead of Phishing scams and the spear phisher’s infrastructure and techniques. …
Key Takeaways From the SolarWinds Breach The SolarWinds hack has presented a cybersecurity reckoning at a scale never before seen for the US government and private enterprises. While the width …
A 2022 global survey of cybersecurity decision makers in the financial services industry that highlights awareness of firmware exploits, future spending, and remediation strategies.
Credit unions face increasingly sophisticated attacks. This study highlights the work of one of New Mexico’s largest credit unions — First Financial Credit Union — as they sealed firmware gaps …
Ransomware attacks can extort your funds, damage your reputation and brand, and shut down or severely degrade your operations for a sustained period of time resulting in additional loss of …
This report focuses on vulnerability trends as reflected by growing security researcher activity on our platform last year, including submission volume, severity, and type. Your guide to a growing attack …
Security teams are under pressure to update their security programs to manage risk for faster product delivery with cloud-native application development. With limited security staff and the cybersecurity skills shortage, …
What constitutes a “bug bounty” and how programs differ across organizations. Top tips for launch and how to grow and measure the impact of your bug bounty program. The evolution …