- 05/25/2022 - Security Boulevard - Popular Python package compromised: Don’t ‘Blindly Trust Open Source’
- 05/24/2022 - SecurityWeek - PyPI Served Malicious Version of Popular 'Ctx' Python Package
- 05/24/2022 - TechTarget - Developers targeted by poisoned Python library
- 05/24/2022 - TechRegister (UK) - Developers targeted by poisoned Python library
- 05/24/2022 - The Hacker News - Popular PyPI Package 'ctx' and PHP Library 'phpass' Hijacked to Steal AWS Keys
- 05/24/2022 - SecurityWeek - PyPI Served Malicious Version of Popular 'Ctx' Python Package
- 05/23/2022 - Neotel Segurança Digital (BR) - What is Port Scanning?
- 05/21/2022 - Insurance Business (AU) - Insurers - here's an alternative to partnering with an insurtech
- 05/20/2022 - cyberwire - Notes from the cyber phases of a hybrid war
- 05/20/2022 - Professional Security (UK) - Cyber and the Law
- 05/20/2022 - The Wall Street Journal - Third-Party Cyber Risk Management Primer
- 05/19/2022 - CIO Korea (APAC) - 12 steps to building a top-notch vulnerability management program
- 05/18/2022 - Beta News -Unlocking the hidden resources that could solve the cyber skills crisis [Q&A]
- 05/18/2022 - Gulf Insider
Bahrain (MENA) :- Tamkeen partners with SANS Institute to provide cybersecurity training
- 05/17/2022 - TradeArabia (MENA) - Tamkeen in deal to provide cyber security training to Bahrainis
- 05/16/2022 - CSO online - 12 steps to building a top-notch vulnerability management program
- 05/14/2022 - cyberwire - Costa Rica declares state of emergency as Conti ransomware cripples government sites
- 05/13/2022 - BestStartup - Meet California's 101 Top Founders in the Education Space
- 05/13/2022 - University Business - How higher ed can pave the way for the future of the cybersecurity workforce
- 05/13/2022 - Heise- Security (DE) - Patch now! F5 BIG-IP systems are under active attack
- 05/12/2022 - ASDAF News (MENA) - Keeping An Eye On Cyber Threats: SANS to Host Immersive Skills Training Program in Qatar
- 05/12/2022 - Computing (UK) - Threat actors exploit F5 BIG-IP vulnerability to wipe devices
- 05/11/2022 - TechTarget - Critical F5 vulnerability under exploitation in the wild
- 05/11/2022 - The Hacker News - CISA Urges Organizations to Patch Actively Exploited F5 BIG-IP Vulnerability
- 05/11/2022 - Bleeping Computer - CISA tells federal agencies to fix actively exploited F5 BIG-IP bug
- 05/11/2022 - cyberwire - A new RAT, and a curious new style of exploit. Advisories from CISA and its partners
- 05/11/2022 - Tech Radar - Major F5 exploit has been used to attack and wipe devices
- 05/11/2022 - Security Week - Critical Vulnerability Exploited to 'Destroy' BIG-IP Appliances
- 05/11/2022 - IFSEC Global (UK) - The history and development of converged security
- 05/10/2022 - Krebs on Security - Microsoft Patch Tuesday, May 2022 Edition
- 05/10/2022 - Ed Tech - Universities Share Lessons Learned from Ransomware Attacks
- 05/10/2022 - Bleeping Computer - Critical F5 BIG-IP vulnerability exploited to wipe devices
- 05/09/2022 - Dark Reading - How to Check If Your F5 BIG-IP Device Is Vulnerable
- 05/09/2022 - Decipher - Exploits Emerge for Critical F5 Flaw
- 05/09/2022 - HelpNetSecurity - Attackers are attempting to exploit critical F5 BIG-IP RCE
- 05/09/2022 - Security Week - F5 BIG-IP in Attacker Crosshairs Following Disclosure of Critical Vulnerability
- 05/09/2022 - Professional Security Magazine (UK) - App threat report
- 05/07/2022 - Security Boulevard - Your Phone May Soon Replace Many of Your Passwords
- 05/07/2022 - Krebs on Security - Your Phone May Soon Replace Many of Your Passwords
- 05/07/2022 - Bollyinside (India) - Many of your passwords may soon be replaced by your phone
- 05/06/2022 - GovInfoSecurity - SANS Institute - Industrial Control System Resilience
- 05/05/2022 - Computable (BE) - Celebrate May 5... with World Password Day
- 05/04/2022 - Cybersecurity: Amplified and Intensified - Cybersecurity Reskilling with Max Shuftan, SANS Institute
- 05/04/2022 - Tech Business News - World Password Day 2022 Reminds the Importance of Digital Hygiene
- 05/04/2022 - ExtraHop - SANS SOC Survey Trends Over the Past Four Years
- 05/04/2022 - BScholarly - Best free Websites to Learn Hacking 2022: Top 10
- 05/03/2022 - Infopoint Security (DE) - SANS Summits: Cloud Security, Neurodiversität und ICS Security
- 05/02/2022 - Toolbox - Looking to Boost Your Password Security Strategy? Top InfoSec Conferences You Shouldn’t Miss
- 05/02/2022 - Defence Connect (AU)- Allectum, SME Gateway win RAAF contract to deliver sustainment office capability for the Distributed Ground Station
- 04/30/2022 - Hardware Info (NL) - SANS report: ransomware just got faster and better
- 04/29/2022- Security Brief (AU) - The increasing importance of cyber threat intelligence
- 04/27/2002 - UK Tech News (UK) - Retailer 'The Works' targeted by cyberattacks, causing some store closures
- 04/26/2022 - Envision RISE - Diversifying the Tech & Cybersecurity Workforce with Women of Color through Education and Training
- 04/25/2002 - Indeed - How To Get an Online Master's Degree in Information Security in 6 Steps
- 04/25/2002 - SmartFutures (UK) - Mind the OT cyber perception gap
- 04/21/2022 - Industrial Cybersecurity Pulse - Cybersecurity tactics to defend your workforce
- 04/20/2022 - ZDNet - The 6 best ethical hacking certifications: Hone your skills
- 04/20/2022 - ZDNet - The 7 best cybersecurity certifications: Become a security expert
- 04/20/2022 - Telecom News (UK) - Expert urges everyday users to be cautious as Downing Street and Foreign Office Mobile Devices Targeted in High Profile Cyber Attack
- 04/20/2022 - UK Tech News (UK) - Expert urges everyday users to be cautious as Downing Street and Foreign Office Mobile Devices Targeted in High Profile Cyber Attack
- 04/19/2022 - Channel Futures (UK) - UK Government Falls Victim to Pegasus Spyware Attacks
- 04/19/2022 - Associations Now - Five Ways to Make Your Digital Documents More Secure
- 04/19/2022 - FederPrivacy (IT) - Information security: the control and risk requirements frameworks of the ISO 27001: 2013 standard
- 04/19/2022 -cyberwire - The Next Evolution of Security Awareness
- 04/19/2022 - MarTech Series - ZeroFox Expands Threat Intelligence Capabilities with Exclusive Visibility into External Threats
- 04/15/2022 - HelpNetSecurity - Critical Microsoft RPC runtime bug: No PoC exploit yet, but patch ASAP! (CVE-2022-26809)
- 04/15/2022 - The New Stack - First Malware Running on AWS Lambda Discovered
- 04/14/022 - Security Boulevard - Filling The Cybersecurity Skills Gap
- 04/13/2022 - The Hacker MInd - Ep 44: Hackers Wanted: Filling The Cybersecurity Skills Gap
- 04/12/2022 - Dice Insights - Threat Hunting Skills Can Boost Your Cybersecurity Career
- 04/12/2022 - CyberWire - Johannes Ullrich from SANS on malicious ISO files embedded in HTML
- 04/12/2022 - CanalTech (BR) - Campanha de spam distribui praga que rouba senhas a usuários corporativos
- 04/12/2022 - Bleeping Computer - New Meta information stealer distributed in malspam campaign
- 04/11/2022 - HelpNetSecurity - The benefits of cyber risk quantification in the modern cybersecurity landscape
- 04/11/2022 - New-Tech Online (IL) - How to get on track to create innovative digital experiences
- 04/08/2022 - IT World Canada - Cyber Security today, Week in Review for Friday, April 8, 2022
- 04/07/2022 - Dark Reading - Mandiant to Use CrowdStrike Technology in Its Incident Response Services
- 04/07/2022 - Government Technology - Governor Proclaims April ‘STEM Month’ in North Carolina
- 04/07/2022 - IDG Connect - Secret CSO - GIAC
- 04/06/2022 - Khaleej Times (UAE) - SANS bridges current cybersecurity skills gap in region
- 04/06/2022- Flatland, Kansas City - Inside Story: Kansas, Cyber Spies, Nuclear Power and the Ukraine War
- 04/06/2022 - HealthITSecurity - Software Vulnerabilities Point to Need for ICS Security in Healthcare
- 04/04/2022 - E&E News EnergyWire - War, fear, ‘hacktivist’ zeal are upending energy cybersecurity
- 04/04/2022 - IT World Canada - Cyber Security Today, April 4, 2022 – British teens face Lapsus$-related criminal charges, an MFA warning and updates needed for Github, Rockwell PLCs and Apple devices
- 04/04/2022 - SecurityWeek - Vendors Assessing Impact of Spring4Shell Vulnerability
- 04/04/2022 - CDO Trends (APAC) - The Security Analyst: An Expert In A Beginner’s Clothing
- 04/02/2022 - Analytics Insight - Top 10 Ethical Hacking Certifications to Become a Security Expert
- 04/01/2022 - VentureBeat - Cyber Hollywood: Onscreen vs. Reality
- 04/01/2022 - iTNews (AU) - SANS spots Spring4shell vulnerability exploitation attempts
- 03/31/2022 - Philadelphia Inquirer - Hackers’ path eased as 600,000 U.S. cybersecurity jobs sit empty
- 03/30/2022 - Bloomberg - Hackers’ Path Eased as 600,000 U.S. Cybersecurity Jobs Sit Empty
- 03/30/2022 - Government Technology - Fears Mount Over 600,000 Unfilled Cybersecurity Jobs
- 03/30/2022 - Tech Times - US Cybersecurity Needs to Fill 600,000 Positions as Country Prepares for Possible Cyberattack From Russia
- 03/30/2022 - TechTarget - Top DevSecOps certifications and trainings
- 03/30/2022 - HelpNetSecurity - How to recruit cybersecurity talent from atypical backgrounds
- 03/30/2022 - Employee Benefit News - HBCUs are working to drive more diverse talent to cybersecurity
- 03/30/2022 - The Blockchain Show - Can Blockchains be hacked?
- 03/30/2022 - Engineering & Technology (UK) - Nearly 40 per cent of UK businesses hit by cyber attacks
- 03/23/2022 - The Washington Post - Experts are split on whether it's okay for Ukrainians to hack Russia
- 03/23/2022 - Le Monde Informatique (FR) - 6 tactiques des cybercriminels pour cacher leurs traces
- 03/22/2022 - CXO Insight (MENA) - SANS Institute At GISEC 2022
- 03/22/2022 - Private Banker International (UK) - Covid-19 created a cybersecurity boom: The Ukraine crisis will see it grow
- 03/22/2022 - Professional Security Magazine (UK) - Biden on cyber ‘critical moment’
- 03/21/2022 - FutureEd (UK) - How schools can ease the cybersecurity talent shortage
- 03/21/2022 - Business Daily Media (UK) - Why businesses should invest more in their people and not cybersecurity technology
- 03/21/2022 - Dark Reading - Will the Biggest Clouds Win? Lessons From Google's Mandiant Buy
- 03/21/2022 - Gulf News (MENA) - SANS Institute to spotlight interactive cybersecurity training and workforce development at GISEC 2022
- 03/20/2022 - CISOLife - Delisha Hodo Interview - SANS Institute HBCU Chair & Senior Student Advisor
- 03/19/2022 - Forbes Brazil (BR) - Compra da Mandiant pelo Google mostra importância da cibersegurança
- 03/18/2022 - The Cyberwire - Hacktivism and other cyberattacks continue against Russian targets, but some hacktivism may go too far. C2C market notes. Advice from CISA and NIST. Prank calls as statecraft
- 03/15/2022 - IT Business Edge - Top 10 Cybersecurity Jobs for 2022
- 03/14/2022 - CSO Online - 8 keys to more effective vulnerability management
- 03/11/2022 - Control Engineering - Cybersecurity: Introduction to ICS security fundamentals
- 03/10/2022 - Enterprise Networking Planet - Best Digital & Computer Forensics Tools 2022
- 03/09/2022 - CSO Online - Responding to heightened cyberattack risk: Focus on the basics
- 03/08/2022 - Forbes - Google’s $5.4 Billion Acquisition Of Cybersecurity Firm Mandiant Comes As Tech Leaders Brace For Escalating Digital Threats
- 03/07/2022 - Dark Reading - Industrial Systems See More Vulnerabilities, Greater Threat
- 03/07/2022 - AARP - The Best Ways to Use Digital Money Tools
- 03/07/2022 - Lawfare - What to Make of Microsoft’s Year in Cybersecurity
- 03/07/2022 - The Naked Scientist - Cyber in context
- 03/07/2022 - Medium - Certification in Cybersecurity!
- 03/07/2022 - RTO Insider - Cyberattacks More Likely as Russo-Ukrainian War Continues - Experts Warn Military Stalemate Could Escalate Risk
- 03/06/2022 - TechTarget - Top DevSecOps certifications and trainings
- 03/04/2022 - Dark Reading - After a Busy December, Attacks on Log4j Vulnerability Dropped
- 03/04/2022 - IT World Canada - Six quick tactics to blunt a cyber attack from Russia – or any nation state
- 03/04/2022 - Industrial Cybersecurity Pulse - Consequence-driven ICS risk management
- 03/03/2022 - The Wall Street Journal - Freight Operator Expeditors Still Working to Recover From Cyberattack
- 03/03/2022 - Dark Reading - Cybersecurity Mesh Architecture: Hope or Hype?
- 03/03/2022 - Enterprise Sec Tech - Johannes Ullrich, SANS: Recognizing Fake Social Media Posts During Russia-Ukraine Conflict
- 03/03/2022 - Wired - Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine
- 03/03/2022 - HelpNetSecurity - The biggest threat to ICS/OT is a lack of prioritization
- 03/02/2022 - World Pipelines - New research reveals cyber attackers are actively targeting OT/ICS environments
- 03/02/2022 - IT World Canada - Cyber Security Today, March 2, 2022 — Toyota and Aon deal with cyber attacks, updates on Axis and Nvidia attacks, and more
- 03/01/2022 - Journal of Petroleum Technology - Research Finds Cyberattackers Actively Target Industrial Operations
- 03/01/2022 - Cyberdegrees.org - Professional Spotlight: Anthony Messina GSEC, GCIH, GPEN
- 02/28/2022 - Forbes - Federal Agencies Have New Cybersecurity Requirements — The Private Sector Can Learn From Them, Too
- 02/25/2022 - The Wall Street Journal - Amid Warnings of Cyberattacks in Ukraine, U.S. Companies ‘Sitting and Waiting’
- 02/25/2022 - eSecurity Planet - SANS Outlines Critical Infrastructure Security Steps as Russia, U.S. Trade Cyberthreats
- 02/25/2022 - Dark Reading - 7 Steps to Take Right Now to Prepare for Cyberattacks by Russia
- 02/25/2022 - The Record by Recorded Future - Most attackers lose interest in Log4Shell
- 02/25/2022 - Industrial Cybersecurity Pulse - Benefits of developing a security awareness program
- 02/24/2022 - The Seattle Times - WA companies prepare as threat of Russian cyberattacks increases
- 02/24/2022 - Government Technology - Cyber Attacks Are Dangerous Russian Weapon Against Ukraine
- 02/23/2022 - The Los Angeles Times - Russia’s other dangerous weapon against Ukraine? Cyberattacks
- 02/23/2022 - The Stack - As Russia strikes, CISOs, security pros are fielding a lot of calls…
- 02/23/2022 - Security Boulevard - Developers Need Security Training
- 02/22/2022 - The Wall Street Journal - Expeditors International Shuts Down Computer Systems After Cyberattack
- 02/19/2022 - Politico - Despite years of preparation, Ukraine’s electric grid still an easy target for Russian hackers
- 02/18/2022 - Industrial Cybersecurity Pulse - Three ways to engage your workforce in 2022
- 02/17/2022 - Security Boulevard - SANS Institute: Preparing for Cyberattacks
- 02/17/2022 - HBCU Buzz - SANS Institute Offers Two HBCU Opportunities To Learn And Win Big
- 02/17/2022 - CyberWire - Daily Podcast Episode 1518 | 2.17.22
- 02/16/2022 - EnterpriseSecurityTech - SANS Institute Launches First-Ever Nationwide Cybersecurity Education Scholarship for HBCU Students
- 02/16/2022 - Security Boulevard - SANS Cyber Defense – PowerShell 2022: State of the Art / Hack / Infection
- 02/16/2022 - Dark Reading - Where AI Falls Down in Cybersecurity
- 02/16/2022 - Alpha Efficiency - Web Development Certifications That Will Boost Your Reputation - GIAC
- 02/15/2022 - The Washington Post - Russian government hackers have likely penetrated critical Ukrainian computer systems, U.S. says
- 02/15/2022 - Dark Reading - Securonix Secures Over $1B in Growth Investment From Vista Equity
- 02/11/2022 - Help Net Security - Apple fixes actively exploited iOS, macOS zero-day (CVE-2022-22620)
- 02/10/2022 - Campus Technology - SANS Institute Launches Cybersecurity Scholarships for HBCU Students
- 02/10/2022 - InfoSecurity Magazine - SANS Institute Launches Nationwide Scholarship Program
- 02/08/2022 - Security Boulevard - Growth of Digital Commerce Fuels 1.5x Increase in Online Fraud in 2021
- 02/07/2022 - Medium - Where to get Cybersecurity Training and Career Development?
- 02/07/2022 - IT World Canada - Cyber Security Today, Feb. 7, 2022 – Insight into a ransomware gang, email used in cyberattacks on Ukraine, and more
- 02/07/2022 - The Wall Street Journal - Cyber Daily: Ukraine Considers Offers for Cyber Help
- 02/05/2022 - TechRepublic - Cybersecurity incident response: The 6 steps to success
- 02/04/2022 - The Washington Post - Senators aren't swayed by Apple's security arguments
- 02/04/2022 - Security Management - Beijing 2022 Winter Olympics Open, Amidst Boycotts and Cyber and Privacy Concerns
- 02/03/2022 - Working Nation - Opening the diversity pathway into the cybersecurity industry
- 02/02/2022 - CSO Online - Packet Data Adds Increasing Value to Next-Gen Cybersecurity: SANS Institute report highlights growing trend
- 01/31/2022 - Federal News Network - Congress wants to overhaul FISMA. Agencies are already starting to measure security differently
- 01/31/2022 - Datamation - 10 Top Cybersecurity Certifications
- 01/31/2022 - SC Magazine - Wanted: mobile app pen testers
- 01/28/2022 - HealthITSecurity - DHS Warns of Potential Russian Cyberattacks on Critical Infrastructure
- 01/26/2022 - Dark Reading - Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit
- 01/26/2022 - CyberDefense - Cybersecurity Experts Share Their Predictions for 2022
- 01/20/2022 - The Washington Post - Is Russia or China the biggest cyber threat? Experts are split
- 01/19/2022 - The State of Security - Tips for Defending Against Adversarial Actions Regardless of Their Origin
- 01/17/2022 - Security Intelligence - What It Takes to Build the Blue Team of Tomorrow
- 01/14/2022 - Associated Press - Cyberattack in Ukraine targets government websites
- 01/14/2022 - USA Today - U.S. assessing cyberattack against government websites in Ukraine
- 01/14/2022 - MarketWatch - Ukraine assessing damage after government websites are taken offline amid cyberattack
- 01/14/2022 - ThreatPost - ‘Be Afraid:’ Massive Cyberattack Downs Ukrainian Gov’t Sites
- 01/14/2022 - IT World Canada - Firms using open source have duty to act fast when bugs are found: Apache
- 01/14/2022 - Security Magazine - Top 28 cybersecurity conferences of 2022
- 01/12/2022 - Dark Reading - Check If You Have to Worry About the Latest HTTP Protocol Stack Flaw
- 01/12/2022 - HealthITSecurity - Critical, “Wormable” Microsoft Vulnerability Could Lead to Cyberattacks
- 01/12/2022 - CIO Magazine - 7 ways to breathe new life into your IT leadership career
- 01/12/2022 - The Daily Swig - Patch Tuesday: Web security issues in the spotlight in Microsoft’s bumper January update
- 01/11/2022 - esecurityplanet - Cybersecurity Employment in 2022: Solving the Skills Gap
- 01/11/2022 - HealthITSecurity - Adopting Defense In Depth Strategies to Combat Healthcare Cyberattacks
- 01/11/2022 - Security Boulevard - To Scale Your Brand Protection Think AI and Automation
- 01/08/2022 - CIO Review - 7 Tips and Tools to Protect University Campuses from Cyber Attacks
- 01/07/2022 - Make Use Of - 3 Ways to Encourage People to Pursue a Career in Cybersecurity
- 01/05/2022 - Security Boulevard - Brand Protection Takes Priority for InfoSec Teams in 2022
- 01/04/2022 - Future of Business and Tech - 3 Tips for Better Cybersecurity in Your Home Office
- 01/04/2022 - CyberWire Podcast - Log4j issues persist
- 01/03/2022 - CSO Online - 6 ways hackers hide their tracks
- 01/02/2022 - Augusta Free Press - Virginia participating in CyberStart America competition
- 12/28/2021 - CSO Online - 4 ways employee home networks and smart devices change your threat model
- 12/23/2021 - CPO Magazine - Preventing Wire Fraud Can Be Easy, Navigating Liability Is Much More Complicated
- 12/22/2021 - Washington Post - Amazon Web Services’ third outage in a month exposes a weak point in the Internet’s backbone
- 12/22/2021 - Security Magazine - SANS holiday hack challenge adds in log4j bonus challenge
- 12/21/2021 - Channel Insider - Best Incident Response Tools for MSPs and MSSPs in 2022
- 12/20/2021 - CSO Online - 8 top penetration testing certifications employers value
- 12/20/2021 - InfoSecurity Magazine - Ukrainian War Games Test Electricity Grid
- 12/17/2021 - The Daily Swig - Ukraine hosts large-scale simulation of cyber-attack against energy grid
- 12/16/2021 - Defense Media Activity - 33rd Network Warfare Squadron AFIN-SOC coordinates SANS Holiday Hack-Fest; boosts unit training and cohesion
- 12/16/2021 - SC Magazine - Industrial cybersecurity requires unique skills. A new apprenticeship program aims to hone them
- 12/16/2021 - Cybersecurity Dive - Security teams prepare for the years-long threat Log4j poses
- 12/15/2021 - HelpNetSecurity - Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations
- 12/15/2021 - Hardcore Gamer - Jack Is Back! The Sans 2021 Holiday Hack Challenge, The Year’s Most Fun & Festive Cybersecurity Challenge, Opens To Players of All Skill Levels
- 12/15/2021 - Industrial Cyber - Siemens Energy, SANS Institute, others align on industrial cybersecurity education
- 12/15/2021 -TechTarget - 'Insane' spread of Log4j exploits won't abate anytime soon
- 12/15/2021 - IT World Canada - Cyber Security Today, Dec 15, 2021: The hunt for Log4Shell bug continues
- 12/15/2021 - TechBeacon - How a modern SOC can make your threat hunting smarter
- 12/14/2021 - Medium - Incident Response (IR) & It’s Lifecycle
- 12/14/2021 - Tom's Guide - Massive Log4Shell internet security flaw threatens everyone — what you can do
- 12/14/2021 - ZD Net - US warns Log4j flaw puts hundreds of millions of devices at risk
- 12/14/2021 - Health IT Security - Severe Apache Log4j Vulnerabilities Could Result in Healthcare Cyberattack
- 12/14/2021 - Security Boulevard - CVE-2021-44228 Log4Shell Detection
- 12/14/2021 - Krebs on Security - Microsoft Patch Tuesday, December 2021 Edition
- 12/13/2021 - Decipher - Critical Log4j Flaw Fallout Continues
- 12/13/2021 -InfoSecurity Magazine - SANS Opens Free Holiday Hack Challenge
- 12/13/2021 - MyStartUpWorld - SANS Holiday Hack Challenge now open
- 12/13/2021 - AccessCyber - The Holidays are for Hacking
- 12/13/2021 - TechTarget - Why you need an email security policy and how to build one
- 12/13/2021 - HelpNetSecurity - Log4Shell update: Attack surface, attacks in the wild, mitigation and remediation
- 12/13/2021 - Security Week - Companies Respond to Log4Shell Vulnerability as Attacks Rise
- 12/11/2021 - IT World Canada - It could take years for applications using vulnerable version of Java log4j library to be patched, says expert
- 12/11/2021 - Financial Post - It could take years for applications using vulnerable version of Java log4j library to be patched, says expert
- 12/10/2021 - Dark Reading - What to Do While Waiting for the Log4J Updates
- 12/10/2021 - protocol - Researchers warn of a 'very, very scary' bug affecting major apps
- 12/10/2021 - VICE / Motherboard - A Simple Exploit is Exposing the Biggest Apps on the Internet
- 12/9/2021 - IT World Canada - Canadian firms lagging in zero trust, SASE architectures, survey suggests
- 12/8/2021 - VICE / Motherboard - AWS Is the Internet's Biggest Single Point of Failure
- 12/8/2021 - VentureBeat - AWS outage shines a light on hybrid cloud
- 12/8/2021 - Dice Insights - Cybersecurity Analyst Interview Questions: 4 Prep Considerations
- 12/6/2021 - HelpNetSecurity - RSA Conference announces initial keynote speakers to address security topics and issues for 2022
- 12/1/2021 - eSecurity Planet - Best Cybersecurity Awareness Training for Employees in 2022
- 11/29/2021 - The Washington Post - Alan Paller, early leader in cybersecurity awareness, dies at 76
- 11/26/2021 - CPO Magazine - Emotet Malware Returns by Leveraging Trickbot’s Infrastructure and Resumes Phishing Campaigns
- 11/25/2021 - San Marcos Corridor News - Texas encourages high school students to participate in CyberStart America talent search
- 11/24/2021 - CSO Online - Biometric Adoption is Driving a Passwordless Future
- 11/24/2021 - Host Review - 5 Cloud Security Resources That You Should Be Using
- 11/23/2021 - Forbes - How Tech Companies Can Help Solve The Cybersecurity Skills Shortage
- 11/23/2021 - Security Boulevard - How to Fix Cybersecurity Recruiting
- 11/22/2021 - Healthy Women - Is Your Health Insurance Provider Tracking You Online?
- 11/18/2021 – Washington Technology - Cybersecurity advocate Alan Paller dead at 76
- 11/18/2021 - The Hack Post - Debunking the Biggest Misconceptions About Purple Teaming: Ensure the Best Results
- 11/17/2021 - The Register - Lock up your Office macros: Emotet botnet back from the dead with Trickbot links
- 11/17/2021 - IT World Canada - Cyber Security Today, Nov. 17, 2021 – Ransomware gangs now buying zero-day vulnerabilities, a warning about vulnerable memory chips and the Emotet gang is back
- 11/17/2021 - Bleeping Computer - Here are the new Emotet spam campaigns hitting mailboxes worldwide
- 11/15/2021 - Central Penn Parent - Top ways to secure your family’s smart home and digital devices this holiday season
- 11/15/2021 - The New York Times - Alan Paller, a Mover on Cybersecurity Threat, Is Dead at 76
- 11/12/2021 - The Washington Post - The Cybersecurity 202: A newsletter briefing on cybersecurity news and policy. Chat Room. (scroll down to end)
- 11/12/2021 -Dark Reading - In Appreciation: Alan Paller
- 11/12/2021 - Daily Swigger - Alan Paller: Infosec World Pays Homage After SANS Founder And Infosec Luminary Dies
- 11/12/2021 -The CyberWire - Business Briefing 11-12-21 (scroll down to Executive Moves)
- 11/11/2021 - Federal News Network - Obituary: Alan Paller
- 11/11/2021 - SC Magazine - Alan Paller, founder of the SANS Institute, passes away at 76
- 11/11/2021 - Homeland Security Today - Cybersecurity Industry Titan and SANS Institute Founder Alan Paller Dies at 76
- 11/10/2021 - Security Boulevard - Podcast | Securing Family Devices with SANS Institute
- 11/05/2021 - Security Magazine - Why cyber risk assessments should be a part of your business strategy
- 11/04/2021 - SC Magazine - Should companies subject employees to ransomware-specific security training?
- 11/03/2021 - Medium - Cloud Security — Best Practices for DevSec Ops.
- 11/01/2021 - TechBeacon - Rethink your DevSecOps: 4 key lessons for achieving security as code
- 11/01/2021 - Technology Decisions - Cyber Academy scholarship program for veterans
- 11/01/2021 - Electrical Contractor Magazine - Grid Security Conference Brought Experts Together to Share Strategies
- 10/29/2021 - CIO Magazine - How Can CISOs Tackle the SOC Talent Shortage?
- 10/27/2021 - NaijaTechGuide - Top 5 Best InfoSec and Cybersecurity Certifications to Uplift your Career
- 10/26/2021 - Enterprise Security Tech - The Hidden Cyber Threat: Secure Your Family's Smart Devices
- 10/26/2021 - Design World - Brewing up DIY automation solutions
- 10/25/2021 - DefenceConnect - Allectum, SANS Institute launch Veterans Cyber Academy Scholarship for 2022
- 10/22/2021 - Forbes - The Importance Of Measuring Security Awareness
- 10/22/2021 - Security Magazine - Ed Skoudis named President of SANS Technology Institute
- 10/21/2021 - IT World Canada - Don’t be tripped up by zero trust myths
- 10/21/2021 - Legal Talk Network - The SANS Institute and Cybersecurity Careers
- 10/21/2021 - Government Technology - USC Aiken and SANS Tech Start Cybersecurity Degree Program
- 10/20/2021 - SC Media - Duke Health officials on security awareness: ‘Harder to tune humans than … to tune a tool’
- 10/20/2021 - Aiken Standard - USC Aiken, SANS cyber experts join forces for new education opportunity
- 10/19/2021 - DataQuest - Cybersecurity Awareness Month: How enterprises should approach cybersecurity
- 10/18/2021 - IT World Canada - Ransomware payments may have totaled hundreds of millions in US, and more
- 10/15/2021 - Washington Post - U.S. pursues a unique solution to fight hackers. It revolves around esports.
- 10/15/2021 - Information Age - Ransomware threatens cyberinsurers
- 10/14/2021 - Homeland Security Today - Cybersecurity Awareness Month 2021: Cyber Hygience Tips for Protecting Children and Families Online
- 10/14/2021 - DarkReading - Digging Deep Into the Top Security Certifications
- 10/14/2021 - Tech Gaming Report - SANS publishes a report on smartphone stability
- 10/14/2021 - Nintendo Power - SANS publishes report on smartphone security
- 10/13/2021 - SearchSecurity: NotPetya ransomware trend moving towards sophistication
- 10/11/2021 - Global Banking & Finance Review - Concern
Over Data Breaches and Frequent Cyber-Attacks are Expected to Drive the
Hardware Security Module (HSM) Market to a Value Of US$ 6,592.5 Mn by
2027 | TMR - 10/11/2021 - The Register - Gripped by cybersec career indecision? Don’t give up. Level up
- 10/11/2021 - CSO Online - 6 ways the pandemic has triggered long-term security changes
- 10/06/2021 - Latest Hacking News - Here’s What Caused Facebook’s Global Outage
- 10/06/2021 - Rapid7 - Five Functions That Benefit From Cybersecurity Automation
- 10/06/2021 - APN News: SANS Institute Introduces #Securethefamily Campaign To Help Protect Families Online
- 10/04/2021 - ZDNet: Cybersecurity budgets for industrial control systems and operational tech increasing: SANS Institute
- 10/04/2021 - IT World Canada: Facebook, Instagram, WhatsApp finally back online
- 10/04/2021 - Forbes: These Three Letter Tech Acronyms Are Likely Behind Today’s Mega Outage At Facebook
- 10/04/2021 - Channel Daily News: Facebook, Instagram, WhatsApp finally back online
- 10/04/2021 - Bleeping Computer: Facebook, WhatsApp, and Instagram down due to DNS outage
- 10/03/2021 - Washington Post: New emergency cyber regulations lay out ‘urgently needed’ rules for pipelines but draw mixed reviews
- 10/01/2021 - InTheBlack: Dark web boom: How to safeguard your corporate data
- 09/30/2021 - ComputerWorld: Edge Computing e cybersecurity: 5 best practice
- 09/25/2021 - CyberNews: Rob T. Lee, SANS Institute: nowhere is the workforce-skills gap more pronounced than in cybersecurity
- 09/24/2021 - ExecutiveGov: Leidos Partners With SANS Institute to Enhance Offerings at CyberEDGE Academy, Address Cybersecurity Talent Gap
- 09/23/2021 - Technically Media: These 11 leaders were named the best in Maryland cybersecurity
- 09/22/2021 - Utility Dive: What utility companies need to know about software bill of materials
- 09/20/2021 - Enterprise Security Tech: Jeff Gatz, New2Cyber Curriculum Director, SANS Institute: Closing the Cybersecurity Workforce Gap
- 09/16/2021 - Voice of CISO: SANS Institute introduces New cybersecurity Training
- 09/14/2021 - Campus Technology: SANS Institute Launches New Training for Entry-Level Cybersecurity Roles
- 09/12/2021- Industrial Cyber: Industrial cyber security training comes into focus in advancing threat landscape – Part II
- 09/05/2021 - Industrial Cyber: Industrial cybersecurity training comes into focus in advancing threat landscape
- 09/03/2021 - SC Media: Rethinking the approach to health care’s reliance on IT as security leaders
- 09/01/2021 - VeryWell Health: 4 Ways to Prove Your COVID-19 Vaccination Status
- 08/26/2021 - Enterprise Security Tech: Women's Equality Day 2021: Women in Cyber Are Stronger Together
- 08/24/2021 - Dark Reading: 4 Steps Organizations Can Take to Increase Diversity in Cybersecurity
- 08/12/2021 - MakeUseOf: What Is an Incident Response Plan?
- 08/04/2021 - CSO: How to prepare your Windows network for a ransomware attack
- 08/02/2021 -SearchSecurity: Improving the cybersecurity workforce with full spectrum development
- 07/21/2021 - Campus Technology: Women's Cybersecurity Training Program Expands with Google Support
- 07/20/2021 - ZDNet: Google, Bloomberg and Facebook pledge support for second year of Security Training Scholarship Program for women
- 07/14/2021 - IT World Canada: Is REvil ransomware gang gone for good or just taking a vacation?
- 07/13/2021 - Security Brief: Network security in the cloud more important than ever
- 07/10/2021 - Security Week: Hackers Scanning for Citrix Systems Affected by Recent Vulnerabilities
- 07/09/2021 - Enterprise Security Tech: Ryan Chapman, SANS Certified Instructor Candidate: The Implications of the Kaseya Ransomware Attack
- 07/08/2021 - NBC News: 'Barely able to keep up': America's cyberwarriors are spread thin by attacks
- 07/08/2021 - ZDnet: The Chris Krebs case for including election systems as critical infrastructure
- 07/08/2021 - Government Executive: For Government Tech Workers, Certification Pays Off in Higher Salaries
- 07/08/2021 - The WSJ: New York City Opens Cyberattack Defense Center
- 06/28/2021 - SC Media: Ransomware: To pay or not to pay
- 06/19/2021 - TechBeacon: Go beyond policy: 5 keys to data protection compliance
- 06/10/2021 - CPO Magazine: What Can Brands Learn From the Facebook Data Leak?
- 06/03/2021 -SearchSecurity: DDoS defense planning falls short
- 05/30/2021 - The Washington Post: Colonial hack exposed government's light-touch oversight of pipeline cybersecurity
- 05/25/2021 - My Tech Decisions: You Need To Focus On These New Cybersecurity Threats
- 02/09/2021 - U.S.News & World Report: 10 Ways to Keep Your Cryptocurrency Safe
- 02/04/2021 - CSO: 10 ways to kill your security career
- 07/07/2020 - Help Net Security: Better cybersecurity hinges on understanding actual risks and addressing the right problems
- 07/06/2020- Dark Reading: Attackers Scan for Vulnerable BIG-IP Devices After Flaw Disclosure
- 06/23/2020 - Dark Reading: Cybercrime Infrastructure Never Really Dies
- 06/22/2020 - CIO Dive: Technology training, certifications demand withstands pandemic slump
- 06/18/2020 - Fox News: Sextortion is evolving during the coronavirus pandemic, report says
- 05/26/2020 - CNN Business: Virtual cybersecurity school teaches kids to fix security flaws and hunt down hackers
- 05/26/2021 - SearchSecurity: How to prevent firewall failures with proper testing and maintenance
- 03/30/2020 - Dark Reading: Securing Your Remote Workforce: A Coronavirus Guide for Businesses
- 03/20/2020 -ZDNet: Free resource to help parents keep kids safe online as schools move to eLearning
- 03/19/2020 - infosecurity magazine: SANS Offers Free Kit to Secure Home Workers
- 03/19/2020 - The Daily Swig: Coronavirus response: How security certification and training orgs are tackling the global disruption
- 03/09/2020 - infosecurity magazine: SANS: Gender Still Biggest Challenge for Many Women in Cyber
- 03/04/2020 - CSO: How to write an effective information security policy
- 03/04/2020 - Data Center Knowledge: Palo Alto Partnership May Boost Confidence in Google Cloud’s Chronicle
- 02/24/2020 - The Washington Post: The Cybersecurity 202: Americans should not be confident about security of 2020 election, experts say
- 02/12/2020 - Security Boulevard: More CEOs Ditching Social Media Over Security Concerns
- 02/03/2020 - CSO: 9 CCPA questions every CISO should be prepared to answer
- 02/03/2020 - SearchSecurity: CISOs face a range of cybersecurity challenges in 2020
- 01/09/2020 - CSO: Winning the war for cybersecurity talent
- 12/20/2019 - SearchCompliance: Lack of data visibility obstructs value, storage costs and compliance
- 12/18/2019 - dvids: For the Army and DoD there are no 'losers' at SANS NetWars
- 12/17/2019 - CSO: Short on security expertise? You can still choose the right solutions
- 12/04/2019 - infosecurity magazine: Festive Virtual Hacker Conference Returns
- 11/14/1209 - infosecurity magazine: Capture the Flag Competition Aims to Trace Missing Persons
- 11/05/2019 - CSO: 5 keys to protect your supply chain from cyberattacks
- 10/29/2019 - Dark Reading: The Real Reasons Why the C-Suite Isn't Complying with Security
- 10/13/2019 - CSO: The CISO’s newest responsibility: Building trust
- 10/02/2019 - The Parallax: Harris poll backs Google plan to improve password security
- 09/18/2019 - SearchCompliance: Protect customer data with these 5 essential steps
- 09/03/2019 - Forbes: Teenage Hackers Wanted: Could Your Kid Be The Next £20M Cybersecurity Superhero?
- 08/15/2019 - SearchCloudSecurity: Research shows cloud security vulnerabilities grow
- 08/02/2019 - Forensic Focus: Interview: Lodrina Cherne, Product Manager, Cybereason
- 07/24/2019 - Dark Reading: 7 Stats That Show What it Takes to Run a Modern SOC
- 07/24/2019 - Data Center Knowledge: Why the WhatsApp Security Flaw Should Make Enterprise IT Nervous
- 07/17/2019 - infosecurity magazine: 75% of Security Awareness Pros Are Part Time
- 07/02/2019 - The Kojo Nnamdi Show: To Combat A Talent Shortage, Cybersecurity Companies Seek Diverse Candidates
- 07/01/2019 - SC Magazine: Women in Security: Women to Watch
- 06/28/2019 - Intelligent CIO: Editor’s Question: How important is cybersecurity education for young people for closing the cyberskills gap?
- 06/20/2019 - California Apparel News: Retailers Take on the Fight Against Organized Crime
- 06/18/2019 - CSO: 6 signs the CIO-CISO relationship is broken — and how to fix it
- 06/14/2019 - SearchSecurity: SANS security awareness credential paves new career path
- 05/18/2019 - Patch: Hartford: Winners Of The 2019 Girls Go Cyberstart Competition Honored
- 05/03/2019 - Dark Reading: The 2019 State of Cloud Security
- 05/03/2019 - Bank Info Security: Trump Order Aims to Boost Federal Cybersecurity Workforce
- 04/18/2019 - Dark Reading: The Cybersecurity Automation Paradox
- 04/10/2019 - CSO: Google expands cloud security capabilities, including simpler configuration
- 04/09/2019 - Dark Reading: A New Approach to Application Security Testing
- 03/27/2019 - Dark Reading: Threat Hunting 101: Not Mission Impossible for the Resource-Challenged
- 03/19/2019 - WSJ Pro: Cyber Daily: Hope, Hype and AI; Defense Department Could Get Cyber Budget Boost
- 03/14/2019 - SearchCompliance: AI cybersecurity benefits are real, but not automatic
- 03/14/2019 - EnergyWire: Pentagon to utilities: Uncle Sam wants you
- 03/11/1209 - infosecurity magazine: #RSAC: The Most Dangerous New Attack Techniques & How to Counter Them
- 03/11/2019 - BankInfoSecurity: Why CISOs Need Partners for Security Success
- 03/07/2019 - HealthITNews: RSA 2019: SANS shares top new security threats – and what to do about them
- 03/07/2019 - SecurityBoulevard: RSA 2019: Day 4 Recap: Keynote Highlights, Capture the Flag, Public Interest Tech and More
- 03/07/2019 - ITWorldCanada: Cyber Security Today - How to create corporate security awareness and a warning on nation-state attacks
- 02/25/2019 - infosecurity magazine: W. Va. Partners with SANS to Bring Girls into Cyber
- 02/13/2019 - CIO: 7 ways to ensure IT gets the credit it deserves
- 01/28/2019 - SearchHRSoftware: Attackers seek gold in HR data security breaches
- 01/02/2019 - ExecutiveGov: Gov't Launching First Employee Reskilling Academy for Cybersecurity
- 12/20/2018 - FOX8: Genealogist urges users to take consumer DNA kits with a grain of salt
- 12/04/2018 - Army.mil: Cyber Soldier attains 'most prestigious credential in the IT Security industry'
- 12/03/2018 - govloop: WHITE HOUSE LAUNCHES CYBER PROGRAM FOR NON-IT FEDS
- 11/30/2018 - fedscoop: Cybersecurity Reskilling Academy created by White House for federal employees
- 11/30/2018 - Federal News Network: Federal Cyber Reskilling Academy to retrain federal employees as cyber defense analyst
- 11/29/2018 - SearchSecurity: Is network traffic monitoring still relevant today?
- 11/06/2018 - Dark Reading: Why the CISSP Remains Relevant to Cybersecurity After 28 Years
- 10/28/2018 - Security Boulevard: Security Awareness: 5 Creative Ways to Train Employees on Cybersecurity
- 10/22/2018 - Dark Reading: Understanding SOCs' 4 Top Deficiencies
- 10/16/2018 - Forbes: Lance Spitzner: How To Secure The Human Operating System
- 10/11/2018 - CSO: What is enterprise risk management? How to put cybersecurity threats into a business context
- 10/09/2018 - CSO: 7 best practices for working with cybersecurity startups
- 09/06/2018 - Army.mil: 'Tiger Stance' focuses on realistic, state-of-the-art cyber task force training
- 08/28/2018 - InformationWeek: How Mid-Size Firms Can Overcome DevOps Challenges
- 08/20/2018 - FCW: Army cyber protection teams upgrade training with a 'real' city
- 08/16/2018 - Federal News Radio: In ‘Cybertropolis,’ Army begins to move its cyber training exercises into the physical world
- 08/05/2018 - WSJ: U.S. Officials Push New Penalties for Hackers of Electrical Grid
- 07/24/2018 - Maryland Department of Labor: Department of Labor EARN Maryland Program Recognized Nationally for Innovation, Effectiveness
- 07/24/2018 - betanews: Endpoints leave industrial IoT vulnerable... Err, what's an endpoint?
- 07/17/2018 - CSO: 5 tips for getting started with DevSecOps
- 07/09/2018 - Dark Reading: Creating a Defensible Security Architecture
- 06/18/2018 - Security Boulevard: Language Matters When It Comes to a Data Breach
- 06/14/2018 - SearchSecurity: How to use the OODA loop to improve network security
- 05/29/2018 - WSJ: The Search for Women Who Want Cybersecurity Careers
- 05/15/2018 - Harvard Business Review: Internet Insecurity
- 05/08/2018 - CSO: Who wants to go threat hunting?
- 04/23/2018 - FCW: China's penetration of U.S. supply chain runs deep, says report
- 04/19/2018 - infosecurity magazine: #RSAC: The Five Most Dangerous New Attacks According to SANS
- 04/19/2018 - eWeek: Security Experts Warn of New Cyber-Threats to Data Stored in Cloud
- 04/19/2018 - IT Security Guru: SANS Experts Share Five Most Dangerous New Attack Techniques
- 04/19/2018 - CIODive: RSAC: 3 key cyberthreats to watch in 2018
- 04/19/2018 - CSO: Two incident response phases most organizations get wrong
- 04/19/2018 - informationsecuritybuzz: SANS Experts Share Five Most Dangerous New Attack Techniques
- 04/18/2018 - Fifth Domain: RSA - Future cyber threats will come from inside the architecture
- 04/13/2018 - NBC News: Jobs in cybersecurity are exploding. Why aren't women in the picture?
- 04/05/2018 - HelpNetSecurity: What’s new at RSAC 2018?
- 03/20/2018 - SearchSecurity: Secure DevOps: Inside the five lifecycle phases
- 03/20/2018 - IDGConnect: Testing the waters: The value of ethical hacking for business
- 03/01/2018 - CNN: China has found a new way to block banned words
- 02/14/2018 - Bank Info Security: How IoT Affects the CISO's Job
- 02/14/2018 - infosecurity magazine: Microsoft Vulnerabilities Accelerate in 2017
- 02/04/2018 - AP News: Woman at Top of Her Game Seeks Girls With a Cyber-Aptitude
- 01/22/2018 - CSO: Video with Rob Lee-SANS DFIR Curriculum Lead: The people you call when you've had a breach
- 01/12/2018 - CSO: Oracle WebLogic hackers pick Monero mining over ransomware
- 01/11/2018 - TechRepublic: How one hacker stole $226K worth of cryptocurrency from Oracle servers
- 01/10/2018 - Dark Reading: Oracle WebLogic Exploit Used in Cryptocurrency Mining Campaign
- 01/09/2018 - ArsTechnica: Oracle app server hack let one attacker mine $226,000 worth of cryptocoins
- 01/08/2018 - IT World Canada: Patching Meltdown/Spectre: Take your time, or get to it fast?
- 01/03/2018 - FE News: It's Time to Go Back to Basics to Address Cybersecurity Skills Shortages
- 01/03/2018 - PaymentsSource: PayThink Users are compromising most security tech
- 12/07/2017 - isBuzzNews: SANS Cybersecurity Trends And Predictions For 2018
- 12/06/2017 - statescoop: Missouri CISO honored with national award for work in cybersecurity
- 11/08/2017 - Defense Systems: Army pushes recruiting and retaining cyber talent
- 10/17/2017 - FCW: IRS pushes back on data protection criticisms
- 10/13/2017 - Dark Reading: Getting the Most Out of Cyber Threat Intelligence
- 10/10/2017 - SearchSecurity: Considerations for developing a cyber threat intelligence team
- 10/02/2017 - SearchSecurity: Is data-centric security worth the implementation challenge?
- 09/06/2017 - information age: What is the biggest threat to data? Ransomware of course
- 08/18/2017 - The Manufacturer - UK: Cyber security in industrial control systems
- 08/17/2017 - SearchSecurity Germany: ICS: Industrielle Steuerungsanlagen als Ziel von Ransomware
- 08/15/2017 - Search Security: Security Teams Must Embrace DevOps Practices or Get Left Behind
- 08/09/2017 - FCW: Can the U.S. Stop Malware and Buy it at the Same Time?
- 08/01/2017 - Data Center Knowledge: What Europe's New Data Protection Law Means for Data Center Operators
- 07/26/2017 - Dark Reading: Adobe's Move to Kill Flash Is Good for Security
- 07/27/2017 - SearchSecurity: What tools were used to hide fileless malware in server memory?
- 07/18/2017 - Dark Reading: SIEM Training Needs a Better Focus on the Human Factor
- 07/11/2017 - SecurityWeek: ICS Security Pros Increasingly Concerned About Ransomware: Survey
- 07/06/2017 - eSecurity Planet: How Not to Handle Incident Response: Automobile Association Exposes 117,000 Customers' Data
- 06/27/2017 - Threatpost: Complex Petya-Like Ransomware Outbreak Worse Than Wannacry
- 06/26/2017 - The Verge: Alexa's new calling feature means it's really time to set up two-factor authentication
- 06/21/2017 - CIO Insight: Security Awareness Programs Need Full-Time Staff
- 06/12/2017 - The Washington Post: Russia has developed a cyberweapon that can disrupt power grids, according to new research
- 06/06/2017 - SearchSecurity: How mobile application assessments can boost enterprise security
- 06/02/2017 - Dark Reading: How to Succeed at Incident Response Metrics
- 06/02/2017 - Computerworld: The top 5 mobile security threats
- 05/30/2017 - Dark Reading: Securing the Human a Full-Time Commitment
- 05/27/2017 - ZDNet: New awareness study reveals what you need for the best security programs
- 05/24/2017 - CSO: Few firms will be ready for new European breach disclosure rules, fines
- 05/22/2017 - CSO: Companies Ramp Up Recruiting Veterans as Cybersecurity Urgency Grows
- 05/03/2017 - DarkReading: 7 Steps to Fight Ransomware
- 04/26/2017 - CSIS Report: IoT, Automation, Autonomy, and Megacities in 2025
- 03/15/2017 - NBC Today: US infrastructure is at ‘red alert’ for hacking, expert says
- 03/13/2017 - Dark Reading: What Your SecOps Team Can (and Should) Do
- 03/07/2017 - Austin Business Journal: 5 reasons Austin businesses should hire 'good' hackers
- 03/01/2017 - Signal: Girding the Grid For Cyber Attacks
- 02/16/2017 - eweek: Ransomware Heads List of 7 Most Dangerous New Cyber-Attack Techniques
- 02/15/2017 - ZDNet: The seven most dangerous attack techniques: A SANS Institute rundown
- 02/15/2017 - PCWorld: The 7 security threats to technology that scare experts the most
- 01/31/2017 - Padtronics: Are IoT Devices Putting Your Organization at Risk?
- 01/27/2017 - CSO: Compliance focus, too much security expertise hurts awareness programs
- 01/26/2017 - Dark Reading: How I Would Hack Your Network (If I Woke Up Evil)
- 01/24/2017 - The Agenda: Confronting Cyber Conflict: Video with Robert M. Lee
- 01/23/2017 - WSJ: Yahoo Faces SEC Probe Over Data Breaches
- 01/11/2017 - Dark Reading: The 3 C's Of Security Awareness
- 01/04/2017 - gtm: The Real Cybersecurity Issues Behind the Overhyped ‘Russia Hacks the Grid’ Story
- 12/21/2016 - CBS News: Video: Russian hacks into Ukraine power grids may be a sign of things to come
- 11/29/2016 - WSJ: Attack Crashes Nearly 1M Deutsche Telekom Internet Routers
- 11/28/2016 - Wired: SF’s Transit Hack Could’ve Been Way Worse—And Cities Must Prepare
- 11/28/2016 - Dark Reading: Time For Security & Privacy To Come Out Of Their Silos
- 11/01/2016 - SearchSecurity: Want a board-level cybersecurity expert? They're hard to find
- 11/01/2016 - Dark Reading: Why Enterprise Security Teams Must Grow Their Mac Skills
- 10/27/2016 - Dark Reading: How To Build A Strong Security Awareness Program
- 10/27/2016 - Forensic Focus: Malware Can Hide, But It Must Run
- 10/19/2017 - CSO: Cybersecurity 'ninjas' value challenges, training and flexible schedules over pay
- 10/10/2016 - HealthITSecurity: Reviewing File Transfer Protocol Healthcare Cybersecurity Risks
- 10/06/2016 - CSO: Evolving risks and business technologies shift focus in security budgets
- 09/19/2016 - CSO: Performance, management and privacy issues stymie SSL inspections, and the bad guys know it
- 09/15/2016 - CSO: Awareness training: How much is too much?
- 08/15/2016 - eSecurity Planet: How to Mitigate Fourth-Party Security Risks
- 08/11/2016 - fedscoop: EPA releases limited summary of cybersecurity report
- 08/11/2016 - fedscoop: Interior falls short in logical access control standards - report
- 08/01/2016 - The Parallax: How to Send Money Securely
- 07/29/2016 - MotherBoard: What Are the Risks of Hacking Infrastructure? Nobody Really Knows
- 07/28/2016 - SearchSecurity: How InfoSec professionals can improve their careers through writing
- 07/26/2016 - SANS State of App Sec report: It's not just about dev teams
- 07/21/2016 - Energy Wire: Utilities look back to the future for hands-on cyberdefense
- 07/20/2016 - EnergyWire: Grid hack exposes troubling security gaps for local utilities
- 07/14/2016 - fedscoop: Survey: Health industry cyber pros moving beyond compliance
- 07/12/2016 - fedscoop: 'We're lucky someone wasn't killed: A look at the patent office's Christmas outage
- 07/08/2016 - Network World: Confusion over cyber insurance leads to coverage gaps
- 06/27/2016 - Cybernance: Who'll Be the Gap Closer in Cyber Insurance?
- 06/22/2016 - CSO: Concerns about security, information sharing up among industrial control system security pros
- 06/22/2016 - SecurityWeek: ICS Security Not Improving, Despite More Attacks
- 06/20/2016 - The Cybersecurity Podcast: Hackers Infiltrated Ukraine's Power Grid. What's Next? With Rob M. Lee
- 06/10/2016 - Security Intelligence: The Evolving State of the Mobile Endpoint
- 06/07/2016 - energy central: How to build NERC CIP compliance: a new course by the SANS Institute
- 06/03/2016 - Archer Energy Solutions: Secret malware targets critical systems that move your world
- 05/24/2016 - the energy connective: What Utilities Are Still Learning About the Ukraine Cyberattacks
- 05/13/2016 - CSM Passcode: Hard lessons for Energy Dept., power sector after Ukraine hack (+video)
- 05/05/2016 - TechRebublic: LAPD hacks iPhone 5s, proves they don't need Apple backdoor
- 04/29/2016 - TechRepublic: Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge
- 04/08/2016 - CSO: Consider the Panama Papers breach a warning
- 03/30/2016 - TechRepublic: Apple demands to know how FBI cracked San Bernardino iPhone
- 03/28/2016 - Forbes: Calling All Women: The Cybersecurity Field Needs You And There's A Million Jobs Waiting
- 03/23/2016 - Forbes: Meet The Ex-Army Hackers Trying To Save America From Blackouts
- 03/15/2016 - FCW: Why Mobile Data Security Matters
- 03/13/2016 - WSJ: Cybersecurity Training, Military Style
- 03/11/2016 - Bloomberg: In the Age of Cybercrime, the Best Insurance May Be Analog
- 03/10/2016 - FP: With Power Plants Getting Hacked, Senate Looks For Ways To Keep The Lights On
- 03/09/2016 - ComputerWorld: Experts warn that 'chip off' plan to access terrorist's iPhone is risky
- 03/03/2016 - TechBeacon: 5 emerging security technologies set to level the battlefield
- 03/03/2016 - CSO: Cybersecurity no longer merger afterthought
- 03/03/2016 - Dark Reading: 7 Attack Trends Making Security Pros Sweat
- 03/08/2016 - ZDNet: Why the connected car is one of this generation's biggest security risks
- 02/29/2016 - New York Times: Utilities Cautioned About Potential for a Cyberattack After Ukraine’s
- 02/29/2016 - Baseline: IT Security Teams Are Stretched to the Limit
- 02/29/2016 - BBC: Ukraine cyber-attacks 'could happen to UK'
- 02/24/2016 - Security Insider: Ausbildung und Zertifizierung von IT-Security-Experten
- 02/21/2016 - Computerwoche: Wie Ihr Security-Training erfolgreich wird
- 02/16/2016 - Marketplace: Hacking competitions burnish cybersecurity resume
- 02/02/2016 - channelinsider: 12 Key Facts About the True Costs of Data Breaches
- 01/28/2016 - SECTANK: Windows 10 liefert mit 'Credential Guard' wichtige Sicherheitsfeatures
- 01/27/2016 - ItBusinessEdge: Why Mobile Apps Are Not Getting More Secure
- 01/26/2016 - CSO: Preparation lowers long-term post-breach costs
- 01/21/2016 - CNN: Hackers could secretly tap into corporate meetings
- 01/21/2016 - CSO: How much at risk is the U.S.'s critical infrastructure?
- 01/20/2016 - fedscoop: Interior Department FISMA audit reveals shortcomings in emergency planning
- 01/20/2016 - Wired: Everything We Know About Ukraine's Power Plant Hack
- 01/19/2016 - ITBusinessEdge: The IoT, IPv6 and DDoS: A Dangerous Mix
- 01/18/2016 - CNN: Scary questions in Ukraine energy grid hack
- 01/08/2016 - Foreign Policy: Did Russia Knock Out Ukraine's Power Grid?
- 01/05/2016 - The Washington Post: Russian hackers suspected in attack that blacked out parts of Ukraine
- 01/04/2016 - Motherboard: Malware Found Inside Downed Ukrainian Grid Management Points to Cyberattack
- 01/04/2016 - Forbes: 30 under 30 in Enterprise Technology: Robert M. Lee
- 01/02/2016 - Security Insider: Wie lief der Angriff auf das Stromnetz der Ukraine?
- 12/21/2015 - The Dallas Morning News: Breach of power: Foreign hackers prove capable of crippling U.S. electric grid
- 12/14/2015 - datensicherheit.de: Smartphone-Forensik: Interessantes Feld für Cyber-Untersuchungen
- 11/27/2015 - TechRepublic: SSH getting a security tune-up from NIST and IETF
- 11/20/2015 - Dark Reading: Introducing 'RITA' for Real Intelligence Threat Analysis
- 11/17/2015 - CSO: Closing the cybersecurity talent gap, one woman at a time
- 11/17/2015 - eWeek: Businesses Lack Resources to Defend Against Cyber-Attacks
- 11/12/2015 - CSO: Is the board's involvement in cybersecurity really that critical?
- 11/11/2015 - ITPRO: Parking fine clerk graduates as world-leading cybersecurity talent
- 11/01/2015 - CBS News: In the dark over power grid security with Larry Pesce, SANS Instructor
- 10/06/2016 - infosecurity: To Stop APTs You Need Anticipatory Active Defenses
- 10/06/2015 - SearchSecurity: How to perform a forensic acquisition of a virtual machine disk
- 09/24/2015 - TechRepublic: The Windows 10 privacy debacle: Five big issues to consider
- 09/11/2015 - Dark Reading: The Truth About DLP & SIEM: It’s A Process Not A Product
- 09/08/2015 - WSJ: Phishing Schemes Target IT Workers at Critical Infrastructure Companies
- 09/24/2015 - Campus Technology: Data Security in Higher Ed – A Moving Target
- 08/19/2015 - CSO: CISOs facing boards need better business, communication skills
- 08/04/2015 - TechTarget: Enterprise IoT Security: Is the sky truly falling?
- 07/31/2015 - CSO: Neiman Marcus case a reminder to check your cyber coverage
- 07/31/2015 - infosecurity: SANS Announces Recruitment Fair for Top Infosec Candidates
- 05/08/2015 - IT Administrator: Penetration Tests in drahtlosen Umgebungen
- 07/20/2015 - Dark Reading: How I Learned To Love Active Defense
- 07/16/2015 - CSO: Regulators seek to limit security software exports
- 06/08/2015 - SearchCloudSecurity: Using a VMware firewall as part of a defense-in-depth strategy
- 07/16/2015 - CSO: Electronic Frontier Foundation celebrates 25 years of defending online privacy
- 07/17/2015 - IT-Director: Riskante Penetrationstests
- 06/22/2015 - Military Times: Cybersecurity degrees are job magnet
- 06/19/2015 - infosecurity: SANS Cyberskills Self-Assessment Addresses Skills Shortage
- 06/16/2015 - CNN: FBI investigating whether Cardinals Hacked Astros
- 06/08/2015 - SNL: Experts warn utilities to watch for cyberattacks via substation break-ins
- 05/20/2015 - IT Job Magazin: SANS Institut bildet weltweit Cyber-Spezialisten aus
- 06/06/2015 - CNN Video: Rob Lee Discusses the OPM.GOV Hack
- 06/03/2015 - CNN: Mac attack! Nasty bug lets hackers into Apple computers
- 06/02/2015 - NetworkWorld: Experts divided on security implications of DOJ's deal with Box
- 05/12/2015 - Smart Grid Today: SECURITY EXPERTS: Utility IT, OT still miles apart
- 05/06/2015 - Medical Product Outsourcing: Device Insecurity
- 04/26/2015 - CBS News Video: Strengthening the nation's defense against hackers
- 04/28/2015 - infosecurity: DDoS, Lizard Squad and Preparing for Cyber-War
- 04/27/2015 - Motherboard: Did Iran Launch a Cyberattack Against the US? Probably Not, New Report Says
- 04/23/2015 - Dark Reading: 6 Most Dangerous New Attack Techniques in 2015
- 04/22/2015 - TheDailyDot: Security companies accused of exaggerating Iran's cyberthreats against the U.S.
- 04/20/2015 - Security Insider: Traumjob Pen Tester : Mit ‚kriminellem‘ Gespür Sicherheit schaffen
- 04/17/2015 - threatpost: Active DoS Exploits for MS15-034 Under Way
- 04/16/2015 - Computerworld: Experts boost threat level, call for patching critical Windows bug ASAP
- 04/16/2015 - DarkReading: Microsoft Zero-Day Bug Being Exploited In The Wild
- 04/16/2015 - threatpost: Ransomware Teslacrypt Still Targeting Gamers
- 04/15/2015 - IT Security Guru: SANS launches Cyber Academy to train cyber skills in eight weeks
- 04/15/2015 - SECTANK: Perspektiven in der Sicherheitsberatung (III) – Trainings: „Qualität hat ihren Preis“
- 04/09/2015 - MicroScope: Lack of soft skills harming security awareness programmes
- 04/01/2015 - SearchSecurity: New cyberthreats: Defending against the digital invasion
- 04/01/2015 - CSMonitor: Obama's cyber sanctions order adds punch to fight against foreign hackers (+video)
- 04/01/2015 - SecurityInsider: Internet Storm Center sucht Anomalien im Web Traffic
- 03/25/2015 - SearchSecurity: Using NIST 800-125-A to understand hypervisor security threats
- 03/23/2015 - CBC News: CyberCity: Model town on front line of digital terrorism
- 03/19/2015 - Today Show Video (w/ SANS Instructor James Lyne) – Are free Wi-Fi hotspots secure?
- 03/15/2015 - ComputerWorld Artikel: Industriekontrollsysteme ausser Kontrolle
- 03/14/2015 - Washington Post: As governor, Jeb Bush used e-mail to discuss security, troop deployments
- 03/10/2015 - Business Insider: Experts are skeptical that Hillary Clinton's 'homebrew' email server could withstand cyberattacks
- 03/09/2015 - threatpost: New Technique Complicates Mutex Malware Analysis
- 03/07/2015 - The Daily Beast: Hillary's Secret Email Was a Cyberspy's Dream Weapon
- 02/13/2015 - Computerworld: Partly cloudy with a chance of hacking?
- 02/13/2015 - SecurityWeek: Netatmo Weather Stations Expose Wi-Fi Passwords: Researcher
- 02/07/2015 - New York Times: Data Breach at Anthem May Lead to Others
- 01/27/2015 - SearchCloudSecurity: Implementing VMware border router ingress and egress filtering
- 01/21/2015 - U.S. News & World Report: Choose the Right Online IT Training
- 01/21/2015 -TheDailyDot: Hospitals prepare for the fight against hackers
- 01/20/2015 -WSJ: CIOs Eye Obama Cybersecurity Push with 'High Level of Interest'
- 01/13/2015 - CSO: Obama proposes new 30-day data breach notification law
- 12/23/2014 - USA Today: Key industries train to thwart cyber attacks
- 12/18/2014 - realtimes: what lies in wait: security threats in 2015
- 12/22/2014 - CSO: 5 lessons to help security pros craft a New Year's resolution
- 12/08/2014 - SearchCloudSecurity: Understanding VMware ESXi hypervisor security features
- 12/10/2014 -CSO: Why the board of directors will go off on security in 2015
- infosecurity: SANS Warns of Shellshock Attacks on NAS Kit
- SearchSecurity: Using secure network tiers to bolster network security rules
- WSJ: CIOs and CISOs Can Learn From the Massive Sony Data Breach
- infosecurity: Cyber-Security SANS Frontières: An Interview with Lance Spitzner
- NetworkWorld: 5 ways to escape password hell
- SearchSecurity: Using crypto-free zones to thwart advanced attacks
- Forbes: America's Critical Infrastructure Is Vulnerable To Cyber Attacks
- SearchSecurity: Operational challenges as cybersecurity gets sensored
- CSO: Apple's iWorm fix still leaves major hole
- CU Info Security: White House Hack: A Lesson Learned
- Forbes: Operational Resilience - Not Just Technology Security - Drives Competitive Advantage
- WSJ: Sabotage Investigation Highlights Poor Network Monitoring at Utilities
- CSO: Did researchers help hackers in releasing USB drive exploit?
- CSO: Three scary, but true, security tales
- Ars Technica: Shellshock fixes beget another round of patches as attacks mount
- CSO: Six key defenses against Shellshock attacks
- SearchSecurity: Attackers already targeting Bash security vulnerability
- HealthCare Info Security: Ramping Up Medical Device Cybersecurity
- SearchSecurity: How to build complex passwords and avoid easy breaches
- CSO: Why retailers like Home Depot get hacked
- SearchSecurity: The case for NAC-based continuous monitoring for attack detection
- InformationWeek: HealthCare.gov Breach: The Ripple Effect
- SearchSecurity: Apple two-factor authentication fail leaves iCloud users vulnerable
- Bloomberg TV: Is This How Jennifer Lawrence Got Hacked
- SearchCloudSecurity: Following iCloud hack, experts say enterprise data likely at risk
- Dice: 4 Interview Qs for Network Penetration Testers
- HealthCare Info Security: Breach Response: Are We Doing Enough?
- DevOps: Internet of Things (IoT) poses challenges for DevOps and security
- Security that works: Three must-have enterprise security fundamentals
- ZDNet: In wake of hacks, incident response efforts weak in enterprise
- Government Technology: Crooks are Winning Cyber War, Experts Say
- IT World Canada: SQL injection attacks can be stopped, says security expert
- CSO: Defensive tactics against sophisticated cyberspies
- Associated Press: T1red of p@sswords? Y0u @re N*t @lone!
- CSO: Today's top skill sets in security -- and why they're in demand
- Dark Reading: Security Pro File: Spam-Inspired Journey From Physics To Security
- Dark Reading: New OpenSSL Flaw Exposes SSL To Man-In-The-Middle Attack
- NetworkWorld: New OpenSSL vulnerability called not as serious as Heartbleed
- BizTech: Q&A: A Word With Security Expert John Pescatore
- eWeek: Health Care Sector Faces Rising Pressure to Bolster Data Security
- CNBC: Cyberwarfare: Protecting 'soft underbelly' of USA
- Careers Info Security: Why InfoSec Pay Shows Lackluster Gains
- SearchSecurity: John Pescatore: Evasion techniques aiding advanced targeted attacks
- CSO: Open campus, security nightmare
- CSO: A security awareness short list from SANS
- SearchSecurity: John Pescatore: BYOIT, IoT among top information security trends
- infosecurity: Infosecurity Europe 2014: Worst Security Threats go Undetected, Warns Dr Eric Cole
- CSO: In a world of complexity, focus on the basics
- ComputerWeekly: Cyber threat detection paramount, says SANS fellow
- SearchSecurity: Good information security leadership demands focus on shared knowledge
- CSO: Tech titan funding just a start in securing critical open-source projects
- FederalNewsRadio: Listen to Interview with Alan Paller on Heartbleed
- Security Bistro: What’s Needed Now: Supply Chain Integrity Testing
- PC Advisor: Think tank challenges Heartbleed handwringing
- CSO: Here are the options with Heartbleed-flawed networking gear (Hint: there aren't many)
- infosecurity: SANS’ Eric Cole Gets Infosecurity Europe Hall of Fame Nod
- Bloomberg: NSA Said to Exploit Heartbleed Bug for Intelligence for Years
- SearchSecurity: 'Heartbleed' OpenSSL vulnerability: A slow-motion train wreck
- Forbes: Avoiding Heartbleed Hype, What To Do To Stay Safe
- ZDNet: Businesses need to inform users about Heartbleed exposure
- The Register: Not just websites hit by OpenSSL's Heartbleed – your PC and phone may be in peril too
- ZDNet: Smart malware campaign attacks only Android
- FierceCIO: Rise of the CSO: a CIO's power threat or job savior?
- CSO Magazine: Info sec industry still struggles to attract women
- WSJ: How Utilities Can Shore up Windows XP Security
- CIO Insight: The Complicated Relationship Between CIOs and CSOs
- InfoWorld: A clear-eyed guide to Mac OS X's actual security risks
- Network World: Focus on fundamentals to reduce data breaches, expert advises
- CSO Magazine: CyberLocker's success will fuel future copycats
- Signal Magazine: Resolving the Critical Infrastructure Cybersecurity Puzzle
- CSO Magazine: SANS seeks feedback in salary survey
- SC Magazine: RSA 2014: Experts discuss the most dangerous new attack techniques
- Security Week: Linksys Router Worm Spreading
- Forbes: New Cyberthreat Report By SANS Institute Delivers Chilling Warning To Healthcare Industry
- Healthcare Info Security: Study: Endpoint Vulnerabilities Common
- WSJ: Medical Devices Can Lead to Breaches
- Energy.Gov: Securing the Nation’s Grid
- SearchSecurity: Cyberthreats: Know thy enemy in 2014
- Washington Post: Senate cybersecurity report finds agencies often fail to take basic preventive measures
- NY Post: Yahoo e-mail customers’ names, passwords stolen
- SC Magazine: Attacker extorts coveted Twitter username in elaborate social engineering scheme
- FCW: Is cybersecurity the right job for you?
- Security Week: Cyber Attack Leverages Internet of Things
- Design News: Fuzzing Framework Fights Control Hackers
- Federal News Radio: Target Breach interview with Johannes Ullrich
- Careers Info Security: Top 10 InfoSec Careers Influencers
- CSO Magazine: Rising impact of Target breach indicates deeper hack into systems
- CBC News: Snapchat hack shows vulnerable side of smartphone apps
- threatpost: Probes Against Linksys Backdoor Port Surging
- Nextgov: The Ten Worst Hacks of 2013
- Nextgov: Awards Recognize Best in Government Cybersecurity
- Security Week: Alleged NSA Payment to RSA Raises New Fears of Gov't Undermining Crypto Security
- Network World: Take the 10th annual SANS Institute Holiday Hacking Challenge
- CSMonitor: Target data theft: worrying sign of cyber thieves' sophistication
- threatpost: Facebook Phishing Campaign Employing Malicious Tumblr Pages
- ComputerWorld: 300 victims report fake support calls to security org
- Nextgov: Master's Accreditation Benefits Federal Cyber Pros
- Course Review: SANS SEC 760 Advanced Exploit Development for Penetration Testers
- CSO Magazine: Can we use Big Data to stop healthcare hacks?
- internet evolution: IT Security Pros Click Into CyberWar
- SC Magazine: The coming Internet of Things
- Nextgov: Cybersecurity Experts Will Face Off in Mock NetWars
- WSJ: U.S. Gives Companies Cybersecurity Guidelines to Protect Critical Infrastructure
- HealthITSecurity: CISO focuses on compliance, collaboration for SANS summit
- Federal News Radio: DHS, SANS Institute join forces to give agencies cyber primer
- NetworkWorld: New GIAC certification advances industrial cyber security
- Certification Magazine: New GIAC cert aimed at protecting industry and infrastructure
- CSO Magazine: What the Internet of Things means for security
- Security Bistro: The Global Industrial Cyber Security Professional Certification (GICSP) is Launching in November
- NBC News: Cyber defenders are in short supply as hacking wars escalate
- Control Engineering: Cyber security experiment reveals threats to industrial systems
- eWeek: Cyber-Security in 2013: Software, People Still Have Vulnerabilities
- ComputerWorld: Shutdown could delay government's patching of IE, Windows and .NET flaws
- ComputerWorld: Adobe hack shows subscription software vendors lucrative targets
- TechRepublic: Researchers reverse-engineer the Dropbox client: What it means
- MIT Technology Review: Dropbox and Similar Services Can Sync Malware
- CSO Magazine: CSOs: Stop flogging the threats and start providing solutions
- Business News Daily: Here Comes Windows 8.1 — Should You Upgrade?
- FCW: Why .gov went dark
- Infosecurity: Former DHS Secretary Launches Council on Cybersecurity
- Infosecurity: SANS: Internet of Things Must Drive Fresh Security Approaches
- Security Bistro: Thinking About How to Secure the Internet of Things (IoT)
- How to make a bazillion dollars in 2014 from Windows XP
- HealthITSecurity: Engaging users to augment healthcare security training
- Course Review: SANS SEC573 Python for Penetration Testers
- NPR: U.S. Worries NSA Leaker's Files Could Be Hacked
- So, You Wanna Be a Penetration Tester?
- CSO Magazine: 5 questions with Alissa Torres, SANS Instructor and Incident Handler at Mandiant
- WSJ: The Morning Download: Gas Industry Lobbies Against Cyber Standards
- NetworkWorld: Security analytics will be the next big thing in IT security
- CyberCity: Training Ground For The Navy SEALs Of Online Defense
- CNN: America's next threat: Cyberterrorism?
- Ecommerce Times: Market Jitters Hint at Social Hacks' High Threat Level
- CSO Magazine: Social engineering in penetration tests: 6 tips for ethical (and legal) use
- TechTarget: Trusted platform module aids Windows mobile device security
- Nextgov: New Tool Can Help Agencies Assess Cyber Skills
- AutomationWorld: An Education in Cyber Security
- Government Technology: Colorado Embraces New IT Security Philosophy
- New York Times: Luring Young Web Warriors Is a Priority. It’s Also a Game.
- NetworkWorld: New course teaches techniques for detecting the most sophisticated malware in RAM only
- Cybersecurity's Skills Deficiency: Paller: 'There's No Pipeline' of Deep-Knowledge Pros
- InformationWeek: China Hack Attacks: Play Offense Or Defense?
- SearchSecurity: Emerging threats include kinetic attack, offensive forensics: RSA 2013
- CRN: 5 Most Dangerous New Hacking Techniques
- Control Engineering: Michael Assante and Tim Conway offer security suggestions for plant operators
- Bank Info Security: CISOs Building Credibility
- New York Times: Some Victims of Online Hacking Edge Into the Light
- CSO: How Colorado's CISO is revamping the state's information security -- on a $6,000 budget
- Fox News: Cyber Experts Needed, But There's a Skills Gap
- LA Times: Hackers target Western news organizations in China
- NBC News: Cyber watchdogs worry about worker shortage
- 3 terrifying, but true, security tales
- 4 Ways to Spot an Internet Scam
- A Tiny City Built To Be Destroyed By Cyber Terrorists, So Real Cities Know What’s Coming
- AirForceTimes: Cybersecurity personnel to have new mission
- Businessweek: The Battle to Protect Confidential Data
- BYOD offers tricks and treats for enterprises, say analysts
- CIO: SANS NetWars tests cybersecurity pros against peers
- CNN: Scammers create fake donation websites for Sandy victims
- Comprehensive Cybersecurity: Securing the Human Operating System
- Course Review: SANS FOR408 Computer Forensic Investigations – Windows In-Depth
- CSO: It's time to start patching the Human OS
- Dark Reading: ‘CyberCity’ Faces Its First Attacks Next Month
- Dice: Did Fried Brain Cells Bag John McAfee?
- Forbes: The Cloud's Not-So-Secret Weak Link
- Forensics: When is Data Truly Lost?
- GCN: NetWars helps develop the future of cybersecurity
- Hackers claim 12 million Apple IDs from FBI
- InfoWorld: Eric Cole: Interview with a remarkable security guru
- Inside a Forensics Investigation
- IT Security Police: 'Step Away From That IE'
- NetWars Tournament of Champions Tests the Skills of the Nation’s Top Cyber Security Practitioners
- NetworkWorld: Want to develop cybersecurity skills? Try SANS Institute's NetWars
- New Cyber Group Aims To Spread Basic Security
- Potential for Sandy scams prompts warnings
- SearchSecurity: Custom, targeted malware attacks demand new malware defense approach
- SearchSecurity: NetWars CyberCity missions to improve critical infrastructure protection
- Tool Scans for RTF Files Spreading Malware in Targeted Attacks
- Washington Post: CyberCity allows government hackers to train for attacks
- Whitelisting Traffic: A practical Exercise for Network Defenders
- SANS CyberCon 2012: It's A Secret
- Forbes: Spammers Are Using Facebook To Impersonate Your Friends
- NY Post: White-hat cyberbug bounty nets cash
- CIO: How to Secure Data by Addressing the Human Element
- Lack of Cyber Career Paths and Training Standards Stymies Security
- Google Switches On Browser Spy Cam in Chrome
- Microsoft provides workarounds for Oracle vulnerability
- DNS Changer: Cyber Criminals, Internet Access And The FBI
- Washington Post: Cybersecurity chief urges action by Congress
- DNSChanger apocalypse: Like Y2K, but even snoozier
- CSO: Alan Paller on cutting through the bull
- DNS Changer virus threat passes; no significant outages
- Thousands risk Internet shutdown as U.S. fix expires
- Botnet infections in the enterprise have experts advocating less automation
- FBI Could Shut Off Servers
- The AC/DC lesson: Why IPv4 will be with us a long time
- Best practices for data encryption, Part 1
- SANS Digital Forensics and Incident Response Summit
- SearchSecurity: Password database inventory required following LinkedIn breach
- InfoWeek: LinkedIn Password Breach: 9 Facts Key To Lawsuit
- CSO: Advanced persistent threats can be beaten, says expert
- Understanding and defeating APT, Part 2: Fighting the 'forever war' against implacable foes
- Understanding and defeating APT, Part 1: Waking up to the who and why behind APT
- How Ethical Hackers Make Computers Safer
- SearchSecurity: Kaspersky Flame malware poses little threat to businesses
- NetworkWorld: New approaches to combat 'sources of evil' and other security issues
- Old remedies don’t work on new threats; SANS panel will discuss alternative medicine
- Despite increased infosec spending, breaches and frustration are on the rise
- 3 Incident Response Essentials with Rob Lee
- Interview with Ed Skoudis: SANS Cyber Guardians hack to help America win the cyberwar
- Interview with SANS' Ed Skoudis: America losing the cybersecurity war to hackers
- Vermont Tech student takes first place in computer skills tournament
- Pitting Education Against Cyber Attacks
- CIO: Mobile Malware: Beware Drive-by Downloads on Your Smartphone
- SC Magazine: The six most dangerous infosec attacks
- Ed Skoudis: RSA Conference Flash Talks 2012
- Air Force aims to turn cyber into a career
- SC Magazine: SANS builds digital certificate checker
- The 10 Biggest Online Security Myths - And How to Avoid Them
- CIO: How to Make Time for Continuing Education and Career Development
- Mobile Device Security Expert Q&A Part II: Start treating phones as computers
- Mobile Device Security Expert Q&A Part I: Where BYOD policy goes wrong
- InformationWeek: 7 Ways To Toughen Enterprise Mobile Device Security
- A Career in Forensics: 5 Key Steps
- Implement user security awareness training
- Forbes: Conversations On Cybersecurity: The Trouble With China, Part 1
- Smart phones getting out of control? SANS hosts first Mobile Device Security Summit
- REMnux 3 review – a treasure chest for the malware-curious
- ComputerWorld Artikel: Industriekontrollsysteme ausser Kontrolle
- Computerworld: Partly cloudy with a chance of hacking?
- Forbes: Avoiding Heartbleed Hype, What To Do To Stay Safe