SANS Top New Attacks and Threat Report
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
Cyberattacks are a top priority in most IT organizations; the risk associated with ransomware attacks, data breaches, business email compromise, and supply chain attacks has garnered that significant attention be …
Key Takeaways From the SolarWinds Breach The SolarWinds hack has presented a cybersecurity reckoning at a scale never before seen for the US government and private enterprises. While the width …
Historically, security managers had the challenge of convincing C-Suite leaders and boards of directors of existing or potential threats. While those days are not necessarily long-gone, the persistence of ransomware …
The Evolution of Threat Hunting Threat hunting continues to evolve for organizations that focus on proactively detecting and isolating Advanced Persistent Threats (APTs) that might otherwise go undetected by traditional, …
A 2022 global survey of cybersecurity decision makers in the financial services industry that highlights awareness of firmware exploits, future spending, and remediation strategies.
Credit unions face increasingly sophisticated attacks. This study highlights the work of one of New Mexico’s largest credit unions — First Financial Credit Union — as they sealed firmware gaps …
Ransomware attacks can extort your funds, damage your reputation and brand, and shut down or severely degrade your operations for a sustained period of time resulting in additional loss of …
This report focuses on vulnerability trends as reflected by growing security researcher activity on our platform last year, including submission volume, severity, and type. Your guide to a growing attack …
How the next generation of Penetration Testing as a Service (PTaaS) is addressing the shortcomings of traditional services. What new research indicates about changing attitudes to penetration testing. Why compliance …