SANS Top New Attacks and Threat Report
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
There are many places to find backward-looking statistics of how many attacks were launched in cyberspace. Forward-looking guidance areas that security managers should focus on are harder to find. In …
Key Takeaways From the SolarWinds Breach The SolarWinds hack has presented a cybersecurity reckoning at a scale never before seen for the US government and private enterprises. While the width …
Historically, security managers had the challenge of convincing C-Suite leaders and boards of directors of existing or potential threats. While those days are not necessarily long-gone, the persistence of ransomware …
The Evolution of Threat Hunting Threat hunting continues to evolve for organizations that focus on proactively detecting and isolating Advanced Persistent Threats (APTs) that might otherwise go undetected by traditional, …
Understanding threat intelligence and implementing a threat intelligence solution to enhance your cybersecurity strategy should not be an intimidating process. With a solid plan, your transition to threat intelligence can …
When first introduced, next–generation firewalls (NGFWs) provided security coverage that consolidate application and network protection on dedicated network appliances. While NGFWs represented a step forward, many offerings were still light …