05/31/2023 - The Hacker News - Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining

05/31/2023 - Help Net Security - Someone is roping Apache NiFi servers into a cryptomining botnet

05/30/2023 - The Cyberwire - Stacy Dunn: My superpower and my kryptonite. [Engineer]

05/30/2023 - CSO - Upskilling the non-technical: finding cyber certification and training for internal hires

05/30/2023 - Cardiology Advisor - FBI Report Offers Bleak Outlook on Cybercriminal Activity

05/30/2023 - Global Security Mag - Digital forensics remains a popular field

05/30/2023 - Digital First - Driving Meaningful Change in the Cybersecurity Landscape

05/30/2023 - Security Boulevard - The Human Factor in Threat Simulation: Testing Employee Awareness and Training Effectiveness

05/30/2023 - Analytics Insight - Top 5 Cyber Security Online Courses to Make a Good Pay

05/30/2023 - CSO - Armed Forces vets well-suited to cybersecurity, says UK Cyber Security Council

05/24/2023 - Dark Reading - Google's .zip, .mov Domains Give Social Engineers a Shiny New Tool

05/24/2023 - Smart Futures - Mind the OT cyber perception gap

05/24/2023 - Electronic Specifier - The shortage of skilled professionals in cyber security

05/24/2023 - CSO - UK government, SANS Institute announce Upskill in Cyber training programme for 2023

05/24/2003 - MSSP Alert - Top 12 vCISO Influencers You Need To Be Following

05/24/2023 - Gaming Deputy - TOP 25 worst iPhone passwords that crack 25% of all Apple smartphones + Poll

05/23/3023 - TahawulTech - Government leaders from IT sector honoured at GovTech Innovation Awards

05/23/2023 - Security Middle East Magazine - SANS Institute to Host 3rd Bahrain Cyber Reskilling Program

05/22/2023 - Wall Street Journal Pro - Your Data Just Leaked. Here’s What Happens Next

05/22/2023 - People of Color in Tech - New SANS Program For BIPOC, Women Brings Cybersecurity To Life Through Hacking Games

05/22/2023 - TechNative - Five ways to keep industrial control systems safe from cyberattacks

05/21/2023 - TechTarget - The potential danger of the new Google .zip top-level domain

05/19/2023 - IT Brew - How Google’s .zip domains help phishers

05/19/2023 - Renal & Urology News - FBI Report Offers Bleak Outlook on Cybercriminal Activity

05/19/2023 - Cybersecurity Insiders - Phishing-resistant MFA 101: What you need to know

05/19/2023 - ATT Cybersecurity - Phishing-resistant MFA 101: What you need to know

05/19/2023 - Our Today - A guide to cybersecurity incident response

05/19/2023 - The Informant - There are 1480 alternatives to .com. The worst has just happened to your safety

05/18/2023 - Information Week - Why Defending Modern Cloud-Based Enterprises Must Start With ZTA

05/18/2023 - DazeInfo - Focus Your Cybersecurity Degree With These Specializations

05/17/2023 - CyberSecurityNews - Hackers are Actively Using the new.zip Domain for Malicious Attacks

05/17/2023 - El Pais - Alexa will employ AI to get promoted to butler of the household

05/17/2023 - Ampere News -Energy workers in Ukraine battle to stay alive & block digital snipers

05/17/2023 - Security Boulevard - ChatGPT: Friend or Foe?

05/16/2023 - Newsweek - Pentagon hacking fears fueled by Microsoft's monopoly on military IT

05/16/2023 - Help Net Security -Google Cloud CISO on why the Google Cybersecurity Certificate matters

05/16/2023 - Financial Post - OpenAI CEO testifies before U.S. Senate Judiciary Subcommittee, calls for regulation of AI

05/16/2023 - Upper Michigan Source - UP High schoolers earn cybersecurity scholarship

05/15/2023 – Wall Street Journal Pro - How Tabletop Exercises Aid Cyber Preparedness

05/15/2023 - ITWorld Canada - Cyber Security Today, May 15, 2023 – Patch this WordPress plugin hole fast, a data breach at a Discord provider and more

05/15/2023 - Spyware News - Let’s Address the Cybersecurity Careers Gap

05/15/2023 – MSSP Alert – Market News May 15

05/15/2023 - Intelligent CIO - Ensuring effective cybersecurity in the retail sector

05/12/2023 - Marketing Resource Directory - SANS INSTITUTE — A Cyber Security Company With a Bold Look

05/12/2023 – Enterprise Storage Forum - Best Cybersecurity Certifications 2023

05/11/2023 - Medium - No More Missed Opportunities: Maximizing Your Threat Hunting Efforts

05/11/2023 - Medium - 5 Best Practices for Secure Code Review: Strategies, Examples, and Tools

05/10/2023 - Government Technology - How Two States Are Bridging Talent Gaps and Growing Their Workforce

05/10/2023 - Information Week - 12 Ways to Approach the Cybersecurity Skills Gap Challenge in 2023

05/10/2023 - IT Brew - IPs for sale: Proxyjackers scale up operations, from residential to cloud

05/10/2023 - SC Magazine - How to tackle the cybersecurity careers gap

05/09/2023 - Business Telegraph - RSA Conference 2023: Unity + Basics = Security

05/09/2023 - The Penninsula - SANS Institute enhances cybersecurity skills in Qatar

05/08/2023 - MIT Technology Review - How to hack a smart fridge

05/08/2023 - IT Web - South Africa needs to bring cyber security into school curricula

05/05/2023 - HIT Consultant - IT Infrastructure: Creating A Culture of Security In Your Hospital & Health System

05/04/2023 - Federal News Network - CISA’s draft attestation form raises key questions about software security push

05/04/2023 - TechNewsWorld - Could Bartenders Close the Tech Skills Gap in Cybersecurity?

05/04/2023 - Continuity Central - Don’t ignore the rising threat of software supply chain attacks…

05/4/2023 - Security Boulevard - How Cyolo Empowers its Partners to Support Secure IT/OT Convergence

05/03/2023 - Security Boulevard - RSA Conference 2023: DevSecOps and The Future Of Security

05/03/2023 - Continuity Central - The five most dangerous new cyber attack techniques

05/03/2023 - Daily Record - Md. cybersecurity group lands Alan Paller Laureate Program grant

05/02/2023 - Mesa Online - AWS: The Importance of Next-Gen Firewalls to Companies’ Security Strategies

05/02/2023 - SpiceWorks - World Password Day 2023: Tech Leaders Discuss Critical Threats and Best Practices

05/02/2023 - Express Computer - SANS Reports Highlight the Need for DNS to Drive SecOps Efficiency in a World of Multicloud

05/02/2023 - WhatsYourTech.ca - Cybersecurity Training Aimed at Women, New Canadians, Career Changers and BIPOC individuals

05/01/2023 - InfoRiskToday - The 5 Most Dangerous New Attack Techniques: SANS Technology Institute President Ed Skoudis on Ever-Changing Attack Surface

05/01/2023 - BankInfoSecurity - The 5 Most Dangerous New Attack Techniques: SANS Technology Institute President Ed Skoudis on Ever-Changing Attack Surface

05/01/2023 - SiliconAngle - At RSA Conference, tales of real-world cyberattacks and warnings of fearsome new threats

05/01/2023 - DataBreachToday - The 5 Most Dangerous New Attack Techniques

04/29/2023 - Converge! Network Digest - RSA 2023 attendance topped 40,000

04/28/2023 - SpiceWorks - RSAC 2023 Spotlight: AI, Innovation Sandbox, Top New Attack Techniques and More

04/28/2023 - SourseSecurity (UK) - RSAC 2023 keynote session: SANS analysts unveil top five new attack techniques to watch

04/28/2023 - CSO - 5 ways threat actors can use ChatGPT to enhance attacks

04/27/2023 - Romanian Security Team Forum - #RSAC: Organizations Warned About the Latest Attack Techniques

04/27/2023 - Dark Reading - SANS Reveals Top 5 Most Dangerous Cyberattacks for 2023

04/27/2023 - IT Business / ITWorld Canada - RSA Conference 2023: How hackers can fool ChatGPT’s defences to create ransomware

04/27/2023 - CSO - 5 most dangerous new attack techniques according to SANS Institute analysts

04/27/2023 - SDX Central - 5 most dangerous new attack techniques (yes, they include AI)

04/27/2023 - InfoSecurity - #RSAC: Organizations Warned About the Latest Attack Techniques

04/27/2023 - SiliconAngle - Ocean’s roar of generative AI and expanding dark web capture security world’s attention at RSA

04/27/2023 - Electronic Specifier - Analysts unveil top five new attack techniques to watch

04/27/2023 - Trucks, Parts, Service - Karmak shares what it learned after being victimized by ransomware attack

04/26/2023 - Forbes - Advancing The Security Operations Center (SOC): New Technologies and Processes Can Help Mitigate Cyber Threats

04/26/2023 - Intelligent CIO - SANS Institute to enhance cybersecurity skills in Qatar through SANS Doha May 2023

04/24/2023 - Security Intelligence - The Needs of a Modernized SOC for Hybrid Cloud

04/21/2023 - Payments Journal - UK Small Business Are Prioritizing Cyber Security Less

04/20/2023 - Spiceworks - What To Expect at the 2023 RSA Conference

04/19/2023 - International Business Times - Small businesses revealed to no longer prioritise cyber security measures

04/18/2023 - Campus Technology - SANS Institute and Google Partner on Cloud Diversity Academy

04/18/2023 - TechTarget - What it takes to be a DevSecOps engineer

04/17/2023 - Maxbit - Silicon Valley Bank Customers Are Vulnerable to Crypto Scams

04/17/2023 - CertMag - Cybersecurity Survey Extra: Cybersecurity certification training materials

04/15/2023 - DEV - The Ultimate DevOps Guide to AWS Security: Tips and Best Practices for Navigating Complexities and Staying Ahead of Threats

04/14/2023 - TechTarget - Pen testing amid the rise of AI-powered threat actors

04/13/2023 - Supply Chain Dive - 3 ways to bolster supply chain cybersecurity as attacks accelerate

04/13/2023 - CIO - Why IT leaders are putting more business pin on security spend

04/12/2023 - SC Magazine - Five ways CISOs can succeed

04/12/2023 - AWS Big Data Blog - SANS Institute uses Amazon QuickSight to drive transformational security awareness maturity within organizations

04/12/2023 - Mindset3 - Stop the World, Need to Think …

04/10/2023 - ITWorldCanada - Cyber attack hits PC maker MSI, another GoAnywhere MFT victim and more

04/10/2023 - GridinSoft - Hackers Infect eFile Tax Filing Service with Malware

04/07/2023 - Yahoo News - What do AI chatbots know about us, and who are they sharing it with?

04/07/2023 - Engadget - What do AI chatbots know about us, and who are they sharing it with?

04/06/2023 - Security Boulevard -Top 10 Cyber Threat Intelligence Certifications for 2023

04/06/2023 - Security Buyer - Women In Cybersecurity And Tech

04/05/2023 - WSJ Pro Cybersecurity Newsletter - IRS tax-filing service has malware

04/05/2023 - Laptop Mag - Free tax filing software caught spreading malware — have you been using it?

04/05/2023 - TechTarget - ICS kill chain: Adapting the cyber kill chain to ICS environments

04/04/2023 - Cowboy State Daily - IRS-Authorized eFile.com Has Exposed Some Wyomingites’ Computers To Malicious Trojan Horse Virus

04/04/2023 - SC Magazine - JavaScript malware infects eFile.com tax-return service since mid-March

04/04/2023 - PC Magazine - Tax Prep Site eFile.com Delivered Malware to Users for Weeks

04/04/2023 - Bleeping Computer - IRS-authorized eFile.com tax return software caught serving JS malware

04/04/2023 - Silicon Angle - IRS-approved tax filing site eFile.com found delivering malware to users for a week

04/04/2023 - Global Security Mag - Hintertür in 3CX-VoIP-Software

04/04/2023 - Gulf Business - Women in tech: Heather Mahalik, fellow instructor at Sans Institute

04/04/2023 - Gulf News - SANS Institute recognized for educating the UAE’s cybersecurity industry with dual award win

04/03/2023 - CSO Online - 5 strategies to manage cybersecurity risks in mergers and acquisitions

04/03/2023 - CRN - 3CX Attack Shows The Dangers Of ‘Alert Fatigue’ For Cybersecurity

03/31/2023 - CRN - 3CX Supply Chain Attack: Big Questions Remain

3/31/2023 - Forbes - World Backup Day Is A Reminder To Back Up Your World

03/31/2023 - Security Informed - SANS And Veritas Security Experts Comment On Data Categorization Ahead Of World Backup Day

03/31/2023 - Hacker News - Deep Dive Into 6 Key Steps to Accelerate Your Incident Response

03/31/2023 - The CyberWire - Creating Connections: Agents of change

03/30/2023 - The Washington Post - Think ransomware gangs won't thrive this year? Think again, experts say

03/30/2023 - The Daily Tribune News of Bahrain - Tamkeen supported 3,500 Bahrainis and 1,217 enterprises in two months

03/29/2023 - Intelligent CISO - Cloud security improving all the time

03/29/2023 - SpiceWorks - World Backup Day 2023: The Importance of Proactive Measures to Prevent Data Loss and Theft

03/28/2023 – ITPro – Former NCSC chief Ciaran Martin pinpoints critical national infrastructure (CNI) as the next big ransomware target

03/28/2023 – Industrial Cyber - WEF initiates multi-stakeholder community to strengthen cyber resilience across manufacturing ecosystem

03/28/2023 - CyberWarzone - What is an Incident Response Retainer Service? A Detailed Guide

03/27/2023 – World Economic Forum - Manufacturing is the most targeted sector by cyberattacks. Here's why increased security matters

03/27/2023 - Enterprise Channels MEA - CISOs getting a seat at the boardroom to discuss security budgets, said Michael Heering

03/27/2023 – Dubai Forum - CISOs getting a seat at the boardroom to discuss security budgets, said Michael Herring

03/27/2023 – Security Review - Video: SANS Institute Focuses on Cyber Security Training to Bridge the Skills Gap at GISEC 2023

03/23/2023 - VentureBeat - Analysts share 8 ChatGPT security predictions for 2023

03/23/3023 - Black Enterprise - Breaking Barriers: SANS Institute’s HBCU+ Academy Expands to Promote Greater Black American Representation in Cybersecurity

03/23/2023 - MSSP Alert - Educational Programs to Enhance Diversity in the CyberSecurity Profession

03/22/2023 - IT Brew - Document, document, document: How to keep patching going when the patch pro leaves

03/22/2023 - IT World Canada - Cyber Security Today, March 22, 2023 – ChatGPT4 is out, poorly-protected Linux servers are exploited, and more

03/20/2023 - Tahawul Tech - Michael Heering of SANS Institute, on why soft skills are important for cybersecurity

03/20/2023 - Express Computer - Ransomware and Malware Intrusions in 2022 (And Preparing for 2023!)

03/20/2023 - SecureMac - Bad guys roll out SVB scams—over the weekend!

03/18/23 - Cyberwire - The fall of Silicon Valley Bank and its aftermath. Threat actor movements. Crime and punishment

03/18/2023 - Security Boulevard - No More Missed Opportunities: Maximizing Your Threat Hunting Efforts

03/17/2020 - ChannelPro - SANS Institute Partners With Google To Launch Cloud Diversity Academy

3/16/2023 - CXO DX - Michael Heering, Marketing Director, Global Field Marketing, SANS Institute spoke to CXO DX at GISEC

03/16/2023 – Making Space - Women in Cybersecurity You Need to Know

03/15/2023 - The Washington Post - Silicon Valley Bank collapse poses challenge for cybersecurity defenders, firms

03/15/2023 - Security Boulevard - Cybersecurity Circular: Threat Vectors Arising from #SVBCollapse

03/15/2023 - CSO - Cybercriminals target SVB customers with BEC and cryptocurrency scams

03/15/2023 - Hacker Noon - What Is the GIAC Penetration Tester (GPEN) Certification?

03/15/2023 - The Register - SVB collapse's mix of money, urgency and uncertainty makes it irresistible to scammers

03/15/2023 - CyberSecurity Connect - Hackers Jump on SVB Bank Crash

03/14/2023 - Bleeping Computer - Cybercriminals exploit SVB collapse to steal money and data

03/14/2023 - Engadget - It took a TikToker barely 30 minutes to doxx me

03/13/2023 - Synopsos - DevSecOps uses policy to take the pressure off testing

03/09/2023 - Medium - Getting Started in Cybersecurity Careers: A Step-by-Step Guide to Start a Career in Cybersecurity

03/09/2023 - Dark Reading - 5 Critical Components of Effective ICS/OT Security

03/09/2023 - Security MagazineME - SANS Institute Announces Student-Company Networking Event

03/08/2023 - Dice - Cyber Security Training: The Best Courses and Where to Start

03/08/2023 - Cybersecurity ASEAN - Take the Pressure off Coding for Your Developers

03/08/2023 - CSO - SANS, Google launch academy to promote cloud security, diversity in workforce

03/08/2023 - SpiceWorks - Women’s Day 2023: Tech Leaders Discuss the Impact of Digital Gender Gap

03/08/2023 - Security MEA - Growing Number of Women in Cybersecurity

03/08/2023 - Intelligent CIO - Supercharging cybersecurity with SANS Institute at GISEC 2023

03/08/2023 - Enterprise Channel MEA - SANS Institute to demonstrate entire product portfolio at GISEC

03/08/2023 - Help Net Security - SANS Institute and Google collaborate to launch Cloud Diversity Academy

03/07/2023 - Insight - Supercharge Your Cybersecurity With SANS Institute At GISEC 2023

03/07/2023 - CSO - What is zero trust? A model for more effective security

03/07/2023 - People of Color in Tech - Google And SANS Launch Cybersecurity Academy For BIPOC As Biden Unveils National Strategy

03/07/2023 - Dark Reading - Key Proposals in Biden's Cybersecurity Strategy Face Congressional Challenges

03/06/2023 - FutureTech - SANS Institute to Show Off its Advanced Suite of Cybersecurity Offerings

03/03/2023 - Medium - How to Get Started With Cybersecurity

03/02/2023 - Test Out Certification Magazine - Salary Survey Extra: Give us more [Fill in the blank] vendor-neutral certs

02/24/2023 - Business News Daily - SANS GIAC Certification Guide: Overview and Career Paths

02/10/2023 - SC Magazine - For ISO 27001 compliance, test application security across your SDLC02/09/2023 - Politico - West Wing Playbook

02/08/2023 - Security Middle East Magazine - Second Phase of Cyber Reskilling Programme Launches in Bahrain

02/08/2023 - Film Daily - Cyber Security Trends and Careers in 2023

02/08/2023 - InformationWeek - A Week of Rampant Ransomware: Breaking Down Ion, VMware Attacks

02/07/2023 - Medium - Cybersecurity For Small Businesses: Protecting Your Most Valuable Assets

02/07/2023 - Security Boulevard - A Primer on Firewall Policy Management

02/06/2023 - IT World Canada - Ransomware is targeting VMware’s hypervisor, hospitals are attacked and more

02/06/2023 - Security Infowatch - Center for Internet Security announces Alan Paller Laureate Program in memory of cybersecurity pioneer

02/06/2023 - HIMSS - Healthcare Cybersecurity Solutions and Simulations at HIMSS23

02/06/2023 - MSSP Alert - Today’s MSSP, MDR, XDR and Cybersecurity Market News

02/03/2023 - TechTarget - How to build an incident response plan, with examples, template

02/02/2023 - The Fordham Ram - The 12 Best Cyber Security Courses In 2023: Stay Safe Online

02/02/2023 - Charged Retail - JD Sports cyber attack: why online retail is vulnerable and what can be done?

02/02/2023 - Bank Info Security - Why COVID-19 Made Leaders Realize Just How Connected OT Networks Really Are

02/01/2023 - SecurityWeek - Cyber Insights 2023: The Geopolitical Effect

01/31/2023 - CisoSeries - People Aren’t the Weakest Link. They’re the Number One Attack Vector

01/31/2023 - Tahawultech - Feature: Data Privacy Day

01/30/2023 - Forbes - JD Sports Group Hacked - What 10 Million Customers Need To Know

01/30/2023 - Evening Standard - Ten million customer accounts at risk as JD Sports falls victim to cyber attack

01/30/2023 - The Register - JD Sports admits intruder accessed 10 million customers' data

1/19/2023 - Digital Journal - Software Defined Security Market Analysis, Top Companies, Scope ,Demand, Opportunity Till 2033

1/19/2023 - Perception Point - What Is Incident Response? Complete Guide for Enterprises [2023]

1/18/2023 - National Cybersecurity - Cybersecurity Top Priority at WAPA as Employees Begin GFACT Certification

1/18/2023 - Yahoo! Finance - ZeroFox Puts Spotlight on Executive Protection with SANS Webinar

1/18/2023 - Insight SC Magazine UK - How to stop burnout in your teams

1/16/2023 - IT World Canada - Cyber Security Today, Jan. 16, 2023 – Hackers use stolen credentials to beat Norton Password Manager, and more

1/15/2023 - Real Security - SANS CyberThreat: an inside track on Europe’s premier cyber security conference

1/12/2023 - Security Boulevard - Certifications to Look for When Choosing a Pen Testing Team

1/12/2023 - Medium - Top 8 Cyber Security Certifications for 2023: Entry Level, Pen Tester, & Expert Level

1/12/2023 - Binance - Local Authorities Reportedly Raid Nexo’s Bulgarian Office


1/12/2023 - Tenable - Google: Monitor These Emerging Cloud Security Challenges in 2023

1/11/2023 - IT News - Microsoft sends security admins their first gift for 2023

1/9/2023 - Charbelnemnom - How to Become A Cybersecurity Specialist? 5 Things to Know

1/9/2023 - Freedom Hacker - Top 5 Free Websites to Learn Hacking this 2023

1/6/2023 - Tanium - 5 Myths—and Realities—About Cyber Insurance

1/6/2023 - Redmond Mag - Microsoft Adds More User Phishing Details to Attack Simulation Training Service

1/4/2023 - Financial Post - Cybersecurity Year in Review for 2022: A lack of resilience

1/4/2023 - Digital Journal - Online Cyber Security Training Services Market 2023 Strategic Assessments – Optiv, Fortinet, Terranova Security (Fortra)

1/3/2023 - WhaTech - Software Defined Security Market scrutinized in the new analysis

1/3/2023 - Oasis Discovery - The Dark Side of ChatGPT: How AI is Changing the Lands

1/2/2023 - QuickTelecast - Ukraine Hacks Add To Worries Of Cyber Conflict With Russia

1/2/2023 - National Cyber Security - How a recession will change the cybersecurity landscape


05/28/2022 -Insurance Business (AUS) - Why insurance CEOs should be technology geeks

12/22/2021 - Washington Post - Amazon Web Services’ third outage in a month exposes a weak point in the Internet’s backbone

12/22/2021 - Security Magazine - SANS holiday hack challenge adds in log4j bonus challenge

12/21/2021 - Channel Insider - Best Incident Response Tools for MSPs and MSSPs in 2022

12/20/2021 - CSO Online - 8 top penetration testing certifications employers value

12/20/2021 - InfoSecurity Magazine - Ukrainian War Games Test Electricity Grid 

12/17/2021 - The Daily Swig - Ukraine hosts large-scale simulation of cyber-attack against energy grid 

12/16/2021 - Defense Media Activity - 33rd Network Warfare Squadron AFIN-SOC coordinates SANS Holiday Hack-Fest; boosts unit training and cohesion

12/16/2021 - SC Magazine - Industrial cybersecurity requires unique skills. A new apprenticeship program aims to hone them

12/16/2021 - Cybersecurity Dive - Security teams prepare for the years-long threat Log4j poses

12/15/2021 - HelpNetSecurity - Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations 

12/15/2021 - Hardcore Gamer - Jack Is Back! The Sans 2021 Holiday Hack Challenge, The Year’s Most Fun & Festive Cybersecurity Challenge, Opens To Players of All Skill Levels

12/15/2021 - Industrial Cyber - Siemens Energy, SANS Institute, others align on industrial cybersecurity education 

12/15/2021 -TechTarget - 'Insane' spread of Log4j exploits won't abate anytime soon

12/15/2021 - IT World Canada - Cyber Security Today, Dec 15, 2021: The hunt for Log4Shell bug continues 

12/15/2021 - TechBeacon - How a modern SOC can make your threat hunting smarter 

12/14/2021 - Medium - Incident Response (IR) & It’s Lifecycle 

12/14/2021 - Tom's Guide - Massive Log4Shell internet security flaw threatens everyone — what you can do

12/14/2021 - ZD Net - US warns Log4j flaw puts hundreds of millions of devices at risk

12/14/2021 - Health IT Security - Severe Apache Log4j Vulnerabilities Could Result in Healthcare Cyberattack 

12/14/2021 - Security Boulevard - CVE-2021-44228 Log4Shell Detection 

12/14/2021 - Krebs on Security - Microsoft Patch Tuesday, December 2021 Edition

12/13/2021 - Decipher - Critical Log4j Flaw Fallout Continues 

12/13/2021 -InfoSecurity Magazine - SANS Opens Free Holiday Hack Challenge

12/13/2021 - MyStartUpWorld - SANS Holiday Hack Challenge now open

12/13/2021 - AccessCyber - The Holidays are for Hacking 

12/13/2021 - TechTarget - Why you need an email security policy and how to build one 

12/13/2021 - HelpNetSecurity - Log4Shell update: Attack surface, attacks in the wild, mitigation and remediation 

12/13/2021 - Security Week - Companies Respond to Log4Shell Vulnerability as Attacks Rise 

12/11/2021 - IT World Canada - It could take years for applications using vulnerable version of Java log4j library to be patched, says expert 

12/11/2021 - Financial Post - It could take years for applications using vulnerable version of Java log4j library to be patched, says expert

12/10/2021 - Dark Reading - What to Do While Waiting for the Log4J Updates

12/10/2021 - protocol - Researchers warn of a 'very, very scary' bug affecting major apps

12/10/2021 - VICE / Motherboard - A Simple Exploit is Exposing the Biggest Apps on the Internet

12/9/2021 - IT World Canada - Canadian firms lagging in zero trust, SASE architectures, survey suggests

12/8/2021 - VICE / Motherboard - AWS Is the Internet's Biggest Single Point of Failure

12/8/2021 - VentureBeat - AWS outage shines a light on hybrid cloud

12/8/2021 - Dice Insights - Cybersecurity Analyst Interview Questions: 4 Prep Considerations

12/6/2021 - HelpNetSecurity - RSA Conference announces initial keynote speakers to address security topics and issues for 2022  

12/1/2021 - eSecurity Planet - Best Cybersecurity Awareness Training for Employees in 2022

11/29/2021 - The Washington Post - Alan Paller, early leader in cybersecurity awareness, dies at 76

11/26/2021 - CPO Magazine - Emotet Malware Returns by Leveraging Trickbot’s Infrastructure and Resumes Phishing Campaigns

11/25/2021 - San Marcos Corridor News - Texas encourages high school students to participate in CyberStart America talent search

11/24/2021 - CSO Online - Biometric Adoption is Driving a Passwordless Future

11/24/2021 - Host Review - 5 Cloud Security Resources That You Should Be Using

11/23/2021 - Forbes - How Tech Companies Can Help Solve The Cybersecurity Skills Shortage

11/23/2021 - Security Boulevard - How to Fix Cybersecurity Recruiting

11/22/2021 - Healthy Women - Is Your Health Insurance Provider Tracking You Online?

11/18/2021 – Washington Technology - Cybersecurity advocate Alan Paller dead at 76

11/18/2021 - The Hack Post - Debunking the Biggest Misconceptions About Purple Teaming: Ensure the Best Results

11/17/2021 - The Register - Lock up your Office macros: Emotet botnet back from the dead with Trickbot links

11/17/2021 - IT World Canada - Cyber Security Today, Nov. 17, 2021 – Ransomware gangs now buying zero-day vulnerabilities, a warning about vulnerable memory chips and the Emotet gang is back

11/17/2021 - Bleeping Computer - Here are the new Emotet spam campaigns hitting mailboxes worldwide

11/15/2021 - Central Penn Parent - Top ways to secure your family’s smart home and digital devices this holiday season

11/15/2021 - The New York Times - Alan Paller, a Mover on Cybersecurity Threat, Is Dead at 76

11/12/2021 - The Washington Post - The Cybersecurity 202: A newsletter briefing on cybersecurity news and policy. Chat Room. (scroll down to end)

11/12/2021 -Dark Reading - In Appreciation: Alan Paller

11/12/2021 - Daily Swigger - Alan Paller: Infosec World Pays Homage After SANS Founder And Infosec Luminary Dies

11/12/2021 -The CyberWire - Business Briefing 11-12-21 (scroll down to Executive Moves)

11/11/2021 - Federal News Network - Obituary: Alan Paller

11/11/2021 - SC Magazine - Alan Paller, founder of the SANS Institute, passes away at 76

11/11/2021 - Homeland Security Today - Cybersecurity Industry Titan and SANS Institute Founder Alan Paller Dies at 76

11/10/2021 - Security Boulevard - Podcast | Securing Family Devices with SANS Institute 

11/05/2021 - Security Magazine - Why cyber risk assessments should be a part of your business strategy 

11/04/2021 - SC Magazine - Should companies subject employees to ransomware-specific security training? 

11/03/2021 - Medium - Cloud Security — Best Practices for DevSec Ops. 

11/01/2021 - TechBeacon - Rethink your DevSecOps: 4 key lessons for achieving security as code 

11/01/2021 - Technology Decisions - Cyber Academy scholarship program for veterans

11/01/2021 - Electrical Contractor Magazine - Grid Security Conference Brought Experts Together to Share Strategies 

10/29/2021 - CIO Magazine - How Can CISOs Tackle the SOC Talent Shortage? 

10/27/2021 - NaijaTechGuide - Top 5 Best InfoSec and Cybersecurity Certifications to Uplift your Career

10/26/2021 - Enterprise Security Tech - The Hidden Cyber Threat: Secure Your Family's Smart Devices

10/26/2021 - Design World - Brewing up DIY automation solutions 

10/25/2021 - DefenceConnect - Allectum, SANS Institute launch Veterans Cyber Academy Scholarship for 2022

10/22/2021 - Forbes - The Importance Of Measuring Security Awareness

10/22/2021 - Security Magazine - Ed Skoudis named President of SANS Technology Institute

10/21/2021 - IT World Canada - Don’t be tripped up by zero trust myths

10/21/2021 - Legal Talk Network - The SANS Institute and Cybersecurity Careers

10/21/2021 - Government Technology - USC Aiken and SANS Tech Start Cybersecurity Degree Program

10/20/2021 - SC Media - Duke Health officials on security awareness: ‘Harder to tune humans than … to tune a tool’

10/20/2021 - Aiken Standard - USC Aiken, SANS cyber experts join forces for new education opportunity

10/19/2021 - DataQuest - Cybersecurity Awareness Month: How enterprises should approach cybersecurity

10/18/2021 - IT World Canada - Ransomware payments may have totaled hundreds of millions in US, and more

10/15/2021 - Washington Post - U.S. pursues a unique solution to fight hackers. It revolves around esports.

10/15/2021 - Information Age - Ransomware threatens cyberinsurers

10/14/2021 - Homeland Security Today - Cybersecurity Awareness Month 2021: Cyber Hygience Tips for Protecting Children and Families Online

10/14/2021 - DarkReading - Digging Deep Into the Top Security Certifications

10/14/2021 - Tech Gaming Report - SANS publishes a report on smartphone stability

10/14/2021 - Nintendo Power - SANS publishes report on smartphone security

10/13/2021 - SearchSecurity: NotPetya ransomware trend moving towards sophistication

10/11/2021 - Global Banking & Finance Review - Concern
Over Data Breaches and Frequent Cyber-Attacks are Expected to Drive the
Hardware Security Module (HSM) Market to a Value Of US$ 6,592.5 Mn by
2027 | TMR

10/11/2021 - The Register - Gripped by cybersec career indecision? Don’t give up. Level up

10/11/2021 - CSO Online - 6 ways the pandemic has triggered long-term security changes

10/06/2021 - Latest Hacking News - Here’s What Caused Facebook’s Global Outage

10/06/2021 - Rapid7 - Five Functions That Benefit From Cybersecurity Automation

10/06/2021 - APN News: SANS Institute Introduces #Securethefamily Campaign To Help Protect Families Online

10/04/2021 - ZDNet: Cybersecurity budgets for industrial control systems and operational tech increasing: SANS Institute

10/04/2021 - IT World Canada: Facebook, Instagram, WhatsApp finally back online

10/04/2021 - Forbes: These Three Letter Tech Acronyms Are Likely Behind Today’s Mega Outage At Facebook

10/04/2021 - Channel Daily News: Facebook, Instagram, WhatsApp finally back online

10/04/2021 - Bleeping Computer: Facebook, WhatsApp, and Instagram down due to DNS outage

10/03/2021 - Washington Post: New emergency cyber regulations lay out ‘urgently needed’ rules for pipelines but draw mixed reviews

10/01/2021 - InTheBlack: Dark web boom: How to safeguard your corporate data

09/30/2021 - ComputerWorld: Edge Computing e cybersecurity: 5 best practice

09/25/2021 - CyberNews: Rob T. Lee, SANS Institute: nowhere is the workforce-skills gap more pronounced than in cybersecurity

09/24/2021 - ExecutiveGov: Leidos Partners With SANS Institute to Enhance Offerings at CyberEDGE Academy, Address Cybersecurity Talent Gap

09/23/2021 - Technically Media: These 11 leaders were named the best in Maryland cybersecurity

09/22/2021 - Utility Dive: What utility companies need to know about software bill of materials

09/20/2021 - Enterprise Security Tech: Jeff Gatz, New2Cyber Curriculum Director, SANS Institute: Closing the Cybersecurity Workforce Gap

09/16/2021 - Voice of CISO: SANS Institute introduces New cybersecurity Training

09/14/2021 - Campus Technology: SANS Institute Launches New Training for Entry-Level Cybersecurity Roles

09/12/2021- Industrial Cyber: Industrial cyber security training comes into focus in advancing threat landscape – Part II

09/05/2021 - Industrial Cyber: Industrial cybersecurity training comes into focus in advancing threat landscape

09/03/2021 - SC Media: Rethinking the approach to health care’s reliance on IT as security leaders

09/01/2021 - VeryWell Health: 4 Ways to Prove Your COVID-19 Vaccination Status

08/26/2021 - Enterprise Security Tech: Women's Equality Day 2021: Women in Cyber Are Stronger Together

08/24/2021 - Dark Reading: 4 Steps Organizations Can Take to Increase Diversity in Cybersecurity

08/12/2021 - MakeUseOf: What Is an Incident Response Plan?

08/04/2021 - CSO: How to prepare your Windows network for a ransomware attack

08/02/2021 -SearchSecurity: Improving the cybersecurity workforce with full spectrum development

07/21/2021 - Campus Technology: Women's Cybersecurity Training Program Expands with Google Support

07/20/2021 - ZDNet: Google, Bloomberg and Facebook pledge support for second year of Security Training Scholarship Program for women

07/14/2021 - IT World Canada: Is REvil ransomware gang gone for good or just taking a vacation?

07/13/2021 - Security Brief: Network security in the cloud more important than ever

07/10/2021 - Security Week: Hackers Scanning for Citrix Systems Affected by Recent Vulnerabilities

07/09/2021 - Enterprise Security Tech: Ryan Chapman, SANS Certified Instructor Candidate: The Implications of the Kaseya Ransomware Attack

07/08/2021 - NBC News: 'Barely able to keep up': America's cyberwarriors are spread thin by attacks

07/08/2021 - ZDnet: The Chris Krebs case for including election systems as critical infrastructure

07/08/2021 - Government Executive: For Government Tech Workers, Certification Pays Off in Higher Salaries

07/08/2021 - The WSJ: New York City Opens Cyberattack Defense Center

06/28/2021 - SC Media: Ransomware: To pay or not to pay

06/19/2021 - TechBeacon: Go beyond policy: 5 keys to data protection compliance

06/10/2021 - CPO Magazine: What Can Brands Learn From the Facebook Data Leak?

06/03/2021 -SearchSecurity: DDoS defense planning falls short

05/30/2021 - The Washington Post: Colonial hack exposed government's light-touch oversight of pipeline cybersecurity

05/25/2021 - My Tech Decisions: You Need To Focus On These New Cybersecurity Threats

02/09/2021 - U.S.News & World Report: 10 Ways to Keep Your Cryptocurrency Safe

02/04/2021 - CSO: 10 ways to kill your security career

07/07/2020 - Help Net Security: Better cybersecurity hinges on understanding actual risks and addressing the right problems

07/06/2020- Dark Reading: Attackers Scan for Vulnerable BIG-IP Devices After Flaw Disclosure

06/23/2020 - Dark Reading: Cybercrime Infrastructure Never Really Dies

06/22/2020 - CIO Dive: Technology training, certifications demand withstands pandemic slump

06/18/2020 - Fox News: Sextortion is evolving during the coronavirus pandemic, report says

05/26/2020 - CNN Business: Virtual cybersecurity school teaches kids to fix security flaws and hunt down hackers

05/26/2021 - SearchSecurity: How to prevent firewall failures with proper testing and maintenance

03/30/2020 - Dark Reading: Securing Your Remote Workforce: A Coronavirus Guide for Businesses

03/20/2020 -ZDNet: Free resource to help parents keep kids safe online as schools move to eLearning

03/19/2020 - infosecurity magazine: SANS Offers Free Kit to Secure Home Workers

03/19/2020 - The Daily Swig: Coronavirus response: How security certification and training orgs are tackling the global disruption

03/09/2020 - infosecurity magazine: SANS: Gender Still Biggest Challenge for Many Women in Cyber

03/04/2020 - CSO: How to write an effective information security policy

03/04/2020 - Data Center Knowledge: Palo Alto Partnership May Boost Confidence in Google Cloud’s Chronicle

02/24/2020 - The Washington Post: The Cybersecurity 202: Americans should not be confident about security of 2020 election, experts say

02/12/2020 - Security Boulevard: More CEOs Ditching Social Media Over Security Concerns

02/03/2020 - CSO: 9 CCPA questions every CISO should be prepared to answer

02/03/2020 - SearchSecurity: CISOs face a range of cybersecurity challenges in 2020

01/09/2020 - CSO: Winning the war for cybersecurity talent

12/20/2019 - SearchCompliance: Lack of data visibility obstructs value, storage costs and compliance

12/18/2019 - dvids: For the Army and DoD there are no 'losers' at SANS NetWars

12/17/2019 - CSO: Short on security expertise? You can still choose the right solutions

12/04/2019 - infosecurity magazine: Festive Virtual Hacker Conference Returns

11/14/1209 - infosecurity magazine: Capture the Flag Competition Aims to Trace Missing Persons

11/05/2019 - CSO: 5 keys to protect your supply chain from cyberattacks

10/29/2019 - Dark Reading: The Real Reasons Why the C-Suite Isn't Complying with Security

10/13/2019 - CSO: The CISO’s newest responsibility: Building trust

10/02/2019 - The Parallax: Harris poll backs Google plan to improve password security

09/18/2019 - SearchCompliance: Protect customer data with these 5 essential steps

09/03/2019 - Forbes: Teenage Hackers Wanted: Could Your Kid Be The Next £20M Cybersecurity Superhero?

08/15/2019 - SearchCloudSecurity: Research shows cloud security vulnerabilities grow

08/02/2019 - Forensic Focus: Interview: Lodrina Cherne, Product Manager, Cybereason

07/24/2019 - Dark Reading: 7 Stats That Show What it Takes to Run a Modern SOC

07/24/2019 - Data Center Knowledge: Why the WhatsApp Security Flaw Should Make Enterprise IT Nervous

07/17/2019 - infosecurity magazine: 75% of Security Awareness Pros Are Part Time

07/02/2019 - The Kojo Nnamdi Show: To Combat A Talent Shortage, Cybersecurity Companies Seek Diverse Candidates

07/01/2019 - SC Magazine: Women in Security: Women to Watch

06/28/2019 - Intelligent CIO: Editor’s Question: How important is cybersecurity education for young people for closing the cyberskills gap?

06/20/2019 - California Apparel News: Retailers Take on the Fight Against Organized Crime

06/18/2019 - CSO: 6 signs the CIO-CISO relationship is broken — and how to fix it

06/14/2019 - SearchSecurity: SANS security awareness credential paves new career path

05/18/2019 - Patch: Hartford: Winners Of The 2019 Girls Go Cyberstart Competition Honored

05/03/2019 - Dark Reading: The 2019 State of Cloud Security

05/03/2019 - Bank Info Security: Trump Order Aims to Boost Federal Cybersecurity Workforce

04/18/2019 - Dark Reading: The Cybersecurity Automation Paradox

04/10/2019 - CSO: Google expands cloud security capabilities, including simpler configuration

04/09/2019 - Dark Reading: A New Approach to Application Security Testing

03/27/2019 - Dark Reading: Threat Hunting 101: Not Mission Impossible for the Resource-Challenged

03/19/2019 - WSJ Pro: Cyber Daily: Hope, Hype and AI; Defense Department Could Get Cyber Budget Boost

03/14/2019 - SearchCompliance: AI cybersecurity benefits are real, but not automatic

03/14/2019 - EnergyWire: Pentagon to utilities: Uncle Sam wants you

03/11/1209 - infosecurity magazine: #RSAC: The Most Dangerous New Attack Techniques & How to Counter Them

03/11/2019 - BankInfoSecurity: Why CISOs Need Partners for Security Success

03/07/2019 - HealthITNews: RSA 2019: SANS shares top new security threats – and what to do about them

03/07/2019 - SecurityBoulevard: RSA 2019: Day 4 Recap: Keynote Highlights, Capture the Flag, Public Interest Tech and More

03/07/2019 - ITWorldCanada: Cyber Security Today - How to create corporate security awareness and a warning on nation-state attacks

02/25/2019 - infosecurity magazine: W. Va. Partners with SANS to Bring Girls into Cyber

02/13/2019 - CIO: 7 ways to ensure IT gets the credit it deserves

01/28/2019 - SearchHRSoftware: Attackers seek gold in HR data security breaches

01/02/2019 - ExecutiveGov: Gov't Launching First Employee Reskilling Academy for Cybersecurity

12/20/2018 - FOX8: Genealogist urges users to take consumer DNA kits with a grain of salt

12/04/2018 - Army.mil: Cyber Soldier attains 'most prestigious credential in the IT Security industry'


11/30/2018 - fedscoop: Cybersecurity Reskilling Academy created by White House for federal employees

11/30/2018 - Federal News Network: Federal Cyber Reskilling Academy to retrain federal employees as cyber defense analyst

11/29/2018 - SearchSecurity: Is network traffic monitoring still relevant today?

11/06/2018 - Dark Reading: Why the CISSP Remains Relevant to Cybersecurity After 28 Years

10/28/2018 - Security Boulevard: Security Awareness: 5 Creative Ways to Train Employees on Cybersecurity

10/22/2018 - Dark Reading: Understanding SOCs' 4 Top Deficiencies

10/16/2018 - Forbes: Lance Spitzner: How To Secure The Human Operating System

10/11/2018 - CSO: What is enterprise risk management? How to put cybersecurity threats into a business context

10/09/2018 - CSO: 7 best practices for working with cybersecurity startups

09/06/2018 - Army.mil: 'Tiger Stance' focuses on realistic, state-of-the-art cyber task force training

08/28/2018 - InformationWeek: How Mid-Size Firms Can Overcome DevOps Challenges

08/20/2018 - FCW: Army cyber protection teams upgrade training with a 'real' city

08/16/2018 - Federal News Radio: In ‘Cybertropolis,’ Army begins to move its cyber training exercises into the physical world

08/05/2018 - WSJ: U.S. Officials Push New Penalties for Hackers of Electrical Grid

07/24/2018 - Maryland Department of Labor: Department of Labor EARN Maryland Program Recognized Nationally for Innovation, Effectiveness

07/24/2018 - betanews: Endpoints leave industrial IoT vulnerable... Err, what's an endpoint?

07/17/2018 - CSO: 5 tips for getting started with DevSecOps

07/09/2018 - Dark Reading: Creating a Defensible Security Architecture

06/18/2018 - Security Boulevard: Language Matters When It Comes to a Data Breach

06/14/2018 - SearchSecurity: How to use the OODA loop to improve network security

05/29/2018 - WSJ: The Search for Women Who Want Cybersecurity Careers

05/15/2018 - Harvard Business Review: Internet Insecurity

05/08/2018 - CSO: Who wants to go threat hunting?

04/23/2018 - FCW: China's penetration of U.S. supply chain runs deep, says report

04/19/2018 - infosecurity magazine: #RSAC: The Five Most Dangerous New Attacks According to SANS

04/19/2018 - eWeek: Security Experts Warn of New Cyber-Threats to Data Stored in Cloud

04/19/2018 - IT Security Guru: SANS Experts Share Five Most Dangerous New Attack Techniques

04/19/2018 - CIODive: RSAC: 3 key cyberthreats to watch in 2018

04/19/2018 - CSO: Two incident response phases most organizations get wrong

04/19/2018 - informationsecuritybuzz: SANS Experts Share Five Most Dangerous New Attack Techniques

04/18/2018 - Fifth Domain: RSA - Future cyber threats will come from inside the architecture

04/13/2018 - NBC News: Jobs in cybersecurity are exploding. Why aren't women in the picture?

04/05/2018 - HelpNetSecurity: What’s new at RSAC 2018?

03/20/2018 - SearchSecurity: Secure DevOps: Inside the five lifecycle phases

03/20/2018 - IDGConnect: Testing the waters: The value of ethical hacking for business

03/01/2018 - CNN: China has found a new way to block banned words

02/14/2018 - Bank Info Security: How IoT Affects the CISO's Job

02/14/2018 - infosecurity magazine: Microsoft Vulnerabilities Accelerate in 2017

02/04/2018 - AP News: Woman at Top of Her Game Seeks Girls With a Cyber-Aptitude

01/22/2018 - CSO: Video with Rob Lee-SANS DFIR Curriculum Lead: The people you call when you've had a breach

01/12/2018 - CSO: Oracle WebLogic hackers pick Monero mining over ransomware

01/11/2018 - TechRepublic: How one hacker stole $226K worth of cryptocurrency from Oracle servers

01/10/2018 - Dark Reading: Oracle WebLogic Exploit Used in Cryptocurrency Mining Campaign

01/09/2018 - ArsTechnica: Oracle app server hack let one attacker mine $226,000 worth of cryptocoins

01/08/2018 - IT World Canada: Patching Meltdown/Spectre: Take your time, or get to it fast?

01/03/2018 - FE News: It's Time to Go Back to Basics to Address Cybersecurity Skills Shortages

01/03/2018 - PaymentsSource: PayThink Users are compromising most security tech

12/07/2017 - isBuzzNews: SANS Cybersecurity Trends And Predictions For 2018

12/06/2017 - statescoop: Missouri CISO honored with national award for work in cybersecurity

11/08/2017 - Defense Systems: Army pushes recruiting and retaining cyber talent

10/17/2017 - FCW: IRS pushes back on data protection criticisms

10/13/2017 - Dark Reading: Getting the Most Out of Cyber Threat Intelligence

10/10/2017 - SearchSecurity: Considerations for developing a cyber threat intelligence team

10/02/2017 - SearchSecurity: Is data-centric security worth the implementation challenge?

09/06/2017 - information age: What is the biggest threat to data? Ransomware of course

08/18/2017 - The Manufacturer - UK: Cyber security in industrial control systems

08/17/2017 - SearchSecurity Germany: ICS: Industrielle Steuerungsanlagen als Ziel von Ransomware

08/15/2017 - Search Security: Security Teams Must Embrace DevOps Practices or Get Left Behind

08/09/2017 - FCW: Can the U.S. Stop Malware and Buy it at the Same Time?

08/01/2017 - Data Center Knowledge: What Europe's New Data Protection Law Means for Data Center Operators

07/26/2017 - Dark Reading: Adobe's Move to Kill Flash Is Good for Security

07/27/2017 - SearchSecurity: What tools were used to hide fileless malware in server memory?

07/18/2017 - Dark Reading: SIEM Training Needs a Better Focus on the Human Factor

07/11/2017 - SecurityWeek: ICS Security Pros Increasingly Concerned About Ransomware: Survey

07/06/2017 - eSecurity Planet: How Not to Handle Incident Response: Automobile Association Exposes 117,000 Customers' Data

06/27/2017 - Threatpost: Complex Petya-Like Ransomware Outbreak Worse Than Wannacry

06/26/2017 - The Verge: Alexa's new calling feature means it's really time to set up two-factor authentication

06/21/2017 - CIO Insight: Security Awareness Programs Need Full-Time Staff

06/12/2017 - The Washington Post: Russia has developed a cyberweapon that can disrupt power grids, according to new research

06/06/2017 - SearchSecurity: How mobile application assessments can boost enterprise security

06/02/2017 - Dark Reading: How to Succeed at Incident Response Metrics

06/02/2017 - Computerworld: The top 5 mobile security threats

05/30/2017 - Dark Reading: Securing the Human a Full-Time Commitment

05/27/2017 - ZDNet: New awareness study reveals what you need for the best security programs

05/24/2017 - CSO: Few firms will be ready for new European breach disclosure rules, fines

05/22/2017 - CSO: Companies Ramp Up Recruiting Veterans as Cybersecurity Urgency Grows

05/03/2017 - DarkReading: 7 Steps to Fight Ransomware

04/26/2017 - CSIS Report: IoT, Automation, Autonomy, and Megacities in 2025

03/15/2017 - NBC Today: US infrastructure is at ‘red alert’ for hacking, expert says

03/13/2017 - Dark Reading: What Your SecOps Team Can (and Should) Do

03/07/2017 - Austin Business Journal: 5 reasons Austin businesses should hire 'good' hackers

03/01/2017 - Signal: Girding the Grid For Cyber Attacks

02/16/2017 - eweek: Ransomware Heads List of 7 Most Dangerous New Cyber-Attack Techniques

02/15/2017 - ZDNet: The seven most dangerous attack techniques: A SANS Institute rundown

02/15/2017 - PCWorld: The 7 security threats to technology that scare experts the most

01/31/2017 - Padtronics: Are IoT Devices Putting Your Organization at Risk?

01/27/2017 - CSO: Compliance focus, too much security expertise hurts awareness programs

01/26/2017 - Dark Reading: How I Would Hack Your Network (If I Woke Up Evil)

01/24/2017 - The Agenda: Confronting Cyber Conflict: Video with Robert M. Lee

01/23/2017 - WSJ: Yahoo Faces SEC Probe Over Data Breaches

01/11/2017 - Dark Reading: The 3 C's Of Security Awareness

01/04/2017 - gtm: The Real Cybersecurity Issues Behind the Overhyped ‘Russia Hacks the Grid’ Story

12/21/2016 - CBS News: Video: Russian hacks into Ukraine power grids may be a sign of things to come

11/29/2016 - WSJ: Attack Crashes Nearly 1M Deutsche Telekom Internet Routers

11/28/2016 - Wired: SF’s Transit Hack Could’ve Been Way Worse—And Cities Must Prepare

11/28/2016 - Dark Reading: Time For Security & Privacy To Come Out Of Their Silos

11/01/2016 - SearchSecurity: Want a board-level cybersecurity expert? They're hard to find

11/01/2016 - Dark Reading: Why Enterprise Security Teams Must Grow Their Mac Skills

10/27/2016 - Dark Reading: How To Build A Strong Security Awareness Program

10/27/2016 - Forensic Focus: Malware Can Hide, But It Must Run

10/19/2017 - CSO: Cybersecurity 'ninjas' value challenges, training and flexible schedules over pay

10/10/2016 - HealthITSecurity: Reviewing File Transfer Protocol Healthcare Cybersecurity Risks

10/06/2016 - CSO: Evolving risks and business technologies shift focus in security budgets

09/19/2016 - CSO: Performance, management and privacy issues stymie SSL inspections, and the bad guys know it

09/15/2016 - CSO: Awareness training: How much is too much?

08/15/2016 - eSecurity Planet: How to Mitigate Fourth-Party Security Risks

08/11/2016 - fedscoop: EPA releases limited summary of cybersecurity report

08/11/2016 - fedscoop: Interior falls short in logical access control standards - report

08/01/2016 - The Parallax: How to Send Money Securely

07/29/2016 - MotherBoard: What Are the Risks of Hacking Infrastructure? Nobody Really Knows

07/28/2016 - SearchSecurity: How InfoSec professionals can improve their careers through writing

07/26/2016 - SANS State of App Sec report: It's not just about dev teams

07/21/2016 - Energy Wire: Utilities look back to the future for hands-on cyberdefense

07/20/2016 - EnergyWire: Grid hack exposes troubling security gaps for local utilities

07/14/2016 - fedscoop: Survey: Health industry cyber pros moving beyond compliance

07/12/2016 - fedscoop: 'We're lucky someone wasn't killed: A look at the patent office's Christmas outage

07/08/2016 - Network World: Confusion over cyber insurance leads to coverage gaps

06/27/2016 - Cybernance: Who'll Be the Gap Closer in Cyber Insurance?

06/22/2016 - CSO: Concerns about security, information sharing up among industrial control system security pros

06/22/2016 - SecurityWeek: ICS Security Not Improving, Despite More Attacks

06/20/2016 - The Cybersecurity Podcast: Hackers Infiltrated Ukraine's Power Grid. What's Next? With Rob M. Lee

06/10/2016 - Security Intelligence: The Evolving State of the Mobile Endpoint

06/07/2016 - energy central: How to build NERC CIP compliance: a new course by the SANS Institute

06/03/2016 - Archer Energy Solutions: Secret malware targets critical systems that move your world

05/24/2016 - the energy connective: What Utilities Are Still Learning About the Ukraine Cyberattacks

05/13/2016 - CSM Passcode: Hard lessons for Energy Dept., power sector after Ukraine hack (+video)

05/05/2016 - TechRebublic: LAPD hacks iPhone 5s, proves they don't need Apple backdoor

04/29/2016 - TechRepublic: Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge

04/08/2016 - CSO: Consider the Panama Papers breach a warning

03/30/2016 - TechRepublic: Apple demands to know how FBI cracked San Bernardino iPhone

03/28/2016 - Forbes: Calling All Women: The Cybersecurity Field Needs You And There's A Million Jobs Waiting

03/23/2016 - Forbes: Meet The Ex-Army Hackers Trying To Save America From Blackouts

03/15/2016 - FCW: Why Mobile Data Security Matters

03/13/2016 - WSJ: Cybersecurity Training, Military Style

03/11/2016 - Bloomberg: In the Age of Cybercrime, the Best Insurance May Be Analog

03/10/2016 - FP: With Power Plants Getting Hacked, Senate Looks For Ways To Keep The Lights On

03/09/2016 - ComputerWorld: Experts warn that 'chip off' plan to access terrorist's iPhone is risky

03/03/2016 - TechBeacon: 5 emerging security technologies set to level the battlefield

03/03/2016 - CSO: Cybersecurity no longer merger afterthought

03/03/2016 - Dark Reading: 7 Attack Trends Making Security Pros Sweat

03/08/2016 - ZDNet: Why the connected car is one of this generation's biggest security risks

02/29/2016 - New York Times: Utilities Cautioned About Potential for a Cyberattack After Ukraine’s

02/29/2016 - Baseline: IT Security Teams Are Stretched to the Limit

02/29/2016 - BBC: Ukraine cyber-attacks 'could happen to UK'

02/24/2016 - Security Insider: Ausbildung und Zertifizierung von IT-Security-Experten

02/21/2016 - Computerwoche: Wie Ihr Security-Training erfolgreich wird

02/16/2016 - Marketplace: Hacking competitions burnish cybersecurity resume

02/02/2016 - channelinsider: 12 Key Facts About the True Costs of Data Breaches

01/28/2016 - SECTANK: Windows 10 liefert mit 'Credential Guard' wichtige Sicherheitsfeatures

01/27/2016 - ItBusinessEdge: Why Mobile Apps Are Not Getting More Secure

01/26/2016 - CSO: Preparation lowers long-term post-breach costs

01/21/2016 - CNN: Hackers could secretly tap into corporate meetings

01/21/2016 - CSO: How much at risk is the U.S.'s critical infrastructure?

01/20/2016 - fedscoop: Interior Department FISMA audit reveals shortcomings in emergency planning

01/20/2016 - Wired: Everything We Know About Ukraine's Power Plant Hack

01/19/2016 - ITBusinessEdge: The IoT, IPv6 and DDoS: A Dangerous Mix

01/18/2016 - CNN: Scary questions in Ukraine energy grid hack

01/08/2016 - Foreign Policy: Did Russia Knock Out Ukraine's Power Grid?

01/05/2016 - The Washington Post: Russian hackers suspected in attack that blacked out parts of Ukraine

01/04/2016 - Motherboard: Malware Found Inside Downed Ukrainian Grid Management Points to Cyberattack

01/04/2016 - Forbes: 30 under 30 in Enterprise Technology: Robert M. Lee

01/02/2016 - Security Insider: Wie lief der Angriff auf das Stromnetz der Ukraine?

12/21/2015 - The Dallas Morning News: Breach of power: Foreign hackers prove capable of crippling U.S. electric grid

12/14/2015 - datensicherheit.de: Smartphone-Forensik: Interessantes Feld für Cyber-Untersuchungen

11/27/2015 - TechRepublic: SSH getting a security tune-up from NIST and IETF

11/20/2015 - Dark Reading: Introducing 'RITA' for Real Intelligence Threat Analysis

11/17/2015 - CSO: Closing the cybersecurity talent gap, one woman at a time

11/17/2015 - eWeek: Businesses Lack Resources to Defend Against Cyber-Attacks

11/12/2015 - CSO: Is the board's involvement in cybersecurity really that critical?

11/11/2015 - ITPRO: Parking fine clerk graduates as world-leading cybersecurity talent

11/01/2015 - CBS News: In the dark over power grid security with Larry Pesce, SANS Instructor

10/06/2016 - infosecurity: To Stop APTs You Need Anticipatory Active Defenses

10/06/2015 - SearchSecurity: How to perform a forensic acquisition of a virtual machine disk

09/24/2015 - TechRepublic: The Windows 10 privacy debacle: Five big issues to consider

09/11/2015 - Dark Reading: The Truth About DLP & SIEM: It’s A Process Not A Product

09/08/2015 - WSJ: Phishing Schemes Target IT Workers at Critical Infrastructure Companies

09/24/2015 - Campus Technology: Data Security in Higher Ed – A Moving Target

08/19/2015 - CSO: CISOs facing boards need better business, communication skills

08/04/2015 - TechTarget: Enterprise IoT Security: Is the sky truly falling?

07/31/2015 - CSO: Neiman Marcus case a reminder to check your cyber coverage

07/31/2015 - infosecurity: SANS Announces Recruitment Fair for Top Infosec Candidates

05/08/2015 - IT Administrator: Penetration Tests in drahtlosen Umgebungen

07/20/2015 - Dark Reading: How I Learned To Love Active Defense

07/16/2015 - CSO: Regulators seek to limit security software exports

06/08/2015 - SearchCloudSecurity: Using a VMware firewall as part of a defense-in-depth strategy

07/16/2015 - CSO: Electronic Frontier Foundation celebrates 25 years of defending online privacy

07/17/2015 - IT-Director: Riskante Penetrationstests

06/22/2015 - Military Times: Cybersecurity degrees are job magnet

06/19/2015 - infosecurity: SANS Cyberskills Self-Assessment Addresses Skills Shortage

06/16/2015 - CNN: FBI investigating whether Cardinals Hacked Astros

06/08/2015 - SNL: Experts warn utilities to watch for cyberattacks via substation break-ins

05/20/2015 - IT Job Magazin: SANS Institut bildet weltweit Cyber-Spezialisten aus

06/06/2015 - CNN Video: Rob Lee Discusses the OPM.GOV Hack

06/03/2015 - CNN: Mac attack! Nasty bug lets hackers into Apple computers

06/02/2015 - NetworkWorld: Experts divided on security implications of DOJ's deal with Box

05/12/2015 - Smart Grid Today: SECURITY EXPERTS: Utility IT, OT still miles apart

05/06/2015 - Medical Product Outsourcing: Device Insecurity

04/26/2015 - CBS News Video: Strengthening the nation's defense against hackers

04/28/2015 - infosecurity: DDoS, Lizard Squad and Preparing for Cyber-War

04/27/2015 - Motherboard: Did Iran Launch a Cyberattack Against the US? Probably Not, New Report Says

04/23/2015 - Dark Reading: 6 Most Dangerous New Attack Techniques in 2015

04/22/2015 - TheDailyDot: Security companies accused of exaggerating Iran's cyberthreats against the U.S.

04/20/2015 - Security Insider: Traumjob Pen Tester : Mit ‚kriminellem‘ Gespür Sicherheit schaffen

04/17/2015 - threatpost: Active DoS Exploits for MS15-034 Under Way

04/16/2015 - Computerworld: Experts boost threat level, call for patching critical Windows bug ASAP

04/16/2015 - DarkReading: Microsoft Zero-Day Bug Being Exploited In The Wild

04/16/2015 - threatpost: Ransomware Teslacrypt Still Targeting Gamers

04/15/2015 - IT Security Guru: SANS launches Cyber Academy to train cyber skills in eight weeks

04/15/2015 - SECTANK: Perspektiven in der Sicherheitsberatung (III) – Trainings: „Qualität hat ihren Preis“

04/09/2015 - MicroScope: Lack of soft skills harming security awareness programmes

04/01/2015 - SearchSecurity: New cyberthreats: Defending against the digital invasion

04/01/2015 -  CSMonitor: Obama's cyber sanctions order adds punch to fight against foreign hackers (+video)

04/01/2015 - SecurityInsider: Internet Storm Center sucht Anomalien im Web Traffic

03/25/2015 - SearchSecurity: Using NIST 800-125-A to understand hypervisor security threats

03/23/2015 - CBC News: CyberCity: Model town on front line of digital terrorism

03/19/2015 - Today Show Video (w/ SANS Instructor James Lyne) – Are free Wi-Fi hotspots secure?

03/15/2015 - ComputerWorld Artikel: Industriekontrollsysteme ausser Kontrolle

03/14/2015 - Washington Post: As governor, Jeb Bush used e-mail to discuss security, troop deployments

03/10/2015 - Business Insider: Experts are skeptical that Hillary Clinton's 'homebrew' email server could withstand cyberattacks

03/09/2015 - threatpost: New Technique Complicates Mutex Malware Analysis

03/07/2015 - The Daily Beast: Hillary's Secret Email Was a Cyberspy's Dream Weapon

02/13/2015 - Computerworld: Partly cloudy with a chance of hacking?

02/13/2015 - SecurityWeek: Netatmo Weather Stations Expose Wi-Fi Passwords: Researcher

02/07/2015 - New York Times: Data Breach at Anthem May Lead to Others

01/27/2015 - SearchCloudSecurity: Implementing VMware border router ingress and egress filtering

01/21/2015 - U.S. News & World Report: Choose the Right Online IT Training

01/21/2015 -TheDailyDot: Hospitals prepare for the fight against hackers

01/20/2015 -WSJ: CIOs Eye Obama Cybersecurity Push with 'High Level of Interest'

01/13/2015 - CSO: Obama proposes new 30-day data breach notification law

12/23/2014 - USA Today: Key industries train to thwart cyber attacks

12/18/2014 - realtimes: what lies in wait: security threats in 2015

12/22/2014 - CSO: 5 lessons to help security pros craft a New Year's resolution

12/08/2014 - SearchCloudSecurity: Understanding VMware ESXi hypervisor security features

12/10/2014 -CSO: Why the board of directors will go off on security in 2015

infosecurity: SANS Warns of Shellshock Attacks on NAS Kit

SearchSecurity: Using secure network tiers to bolster network security rules

WSJ: CIOs and CISOs Can Learn From the Massive Sony Data Breach

infosecurity: Cyber-Security SANS Frontières: An Interview with Lance Spitzner

NetworkWorld: 5 ways to escape password hell

SearchSecurity: Using crypto-free zones to thwart advanced attacks

Forbes: America's Critical Infrastructure Is Vulnerable To Cyber Attacks

SearchSecurity: Operational challenges as cybersecurity gets sensored

CSO: Apple's iWorm fix still leaves major hole

CU Info Security: White House Hack: A Lesson Learned

Forbes: Operational Resilience - Not Just Technology Security - Drives Competitive Advantage

WSJ: Sabotage Investigation Highlights Poor Network Monitoring at Utilities

CSO: Did researchers help hackers in releasing USB drive exploit?

CSO: Three scary, but true, security tales

Ars Technica: Shellshock fixes beget another round of patches as attacks mount

CSO: Six key defenses against Shellshock attacks

SearchSecurity: Attackers already targeting Bash security vulnerability

HealthCare Info Security: Ramping Up Medical Device Cybersecurity

SearchSecurity: How to build complex passwords and avoid easy breaches

CSO: Why retailers like Home Depot get hacked

SearchSecurity: The case for NAC-based continuous monitoring for attack detection

InformationWeek: HealthCare.gov Breach: The Ripple Effect

SearchSecurity: Apple two-factor authentication fail leaves iCloud users vulnerable

Bloomberg TV: Is This How Jennifer Lawrence Got Hacked

SearchCloudSecurity: Following iCloud hack, experts say enterprise data likely at risk

Dice: 4 Interview Qs for Network Penetration Testers

HealthCare Info Security: Breach Response: Are We Doing Enough?

DevOps: Internet of Things (IoT) poses challenges for DevOps and security

Security that works: Three must-have enterprise security fundamentals

ZDNet: In wake of hacks, incident response efforts weak in enterprise

Government Technology: Crooks are Winning Cyber War, Experts Say

IT World Canada: SQL injection attacks can be stopped, says security expert

CSO: Defensive tactics against sophisticated cyberspies

Associated Press: T1red of p@sswords? Y0u @re N*t @lone!

CSO: Today's top skill sets in security -- and why they're in demand

Dark Reading: Security Pro File: Spam-Inspired Journey From Physics To Security

Dark Reading: New OpenSSL Flaw Exposes SSL To Man-In-The-Middle Attack

NetworkWorld: New OpenSSL vulnerability called not as serious as Heartbleed

BizTech: Q&A: A Word With Security Expert John Pescatore

eWeek: Health Care Sector Faces Rising Pressure to Bolster Data Security

CNBC: Cyberwarfare: Protecting 'soft underbelly' of USA

Careers Info Security: Why InfoSec Pay Shows Lackluster Gains

SearchSecurity: John Pescatore: Evasion techniques aiding advanced targeted attacks

CSO: Open campus, security nightmare

CSO: A security awareness short list from SANS

SearchSecurity: John Pescatore: BYOIT, IoT among top information security trends

infosecurity: Infosecurity Europe 2014: Worst Security Threats go Undetected, Warns Dr Eric Cole

CSO: In a world of complexity, focus on the basics

ComputerWeekly: Cyber threat detection paramount, says SANS fellow

SearchSecurity: Good information security leadership demands focus on shared knowledge

CSO: Tech titan funding just a start in securing critical open-source projects

FederalNewsRadio: Listen to Interview with Alan Paller on Heartbleed

Security Bistro: What’s Needed Now: Supply Chain Integrity Testing

PC Advisor: Think tank challenges Heartbleed handwringing

CSO: Here are the options with Heartbleed-flawed networking gear (Hint: there aren't many)

infosecurity: SANS’ Eric Cole Gets Infosecurity Europe Hall of Fame Nod

Bloomberg: NSA Said to Exploit Heartbleed Bug for Intelligence for Years

SearchSecurity: 'Heartbleed' OpenSSL vulnerability: A slow-motion train wreck

Forbes: Avoiding Heartbleed Hype, What To Do To Stay Safe

ZDNet: Businesses need to inform users about Heartbleed exposure

The Register: Not just websites hit by OpenSSL's Heartbleed – your PC and phone may be in peril too

ZDNet: Smart malware campaign attacks only Android

FierceCIO: Rise of the CSO: a CIO's power threat or job savior?

CSO Magazine: Info sec industry still struggles to attract women

WSJ: How Utilities Can Shore up Windows XP Security

CIO Insight: The Complicated Relationship Between CIOs and CSOs

InfoWorld: A clear-eyed guide to Mac OS X's actual security risks

Network World: Focus on fundamentals to reduce data breaches, expert advises

CSO Magazine: CyberLocker's success will fuel future copycats

Signal Magazine: Resolving the Critical Infrastructure Cybersecurity Puzzle

CSO Magazine: SANS seeks feedback in salary survey

SC Magazine: RSA 2014: Experts discuss the most dangerous new attack techniques

Security Week: Linksys Router Worm Spreading

Forbes: New Cyberthreat Report By SANS Institute Delivers Chilling Warning To Healthcare Industry

Healthcare Info Security: Study: Endpoint Vulnerabilities Common

WSJ: Medical Devices Can Lead to Breaches

Energy.Gov: Securing the Nation’s Grid

SearchSecurity: Cyberthreats: Know thy enemy in 2014

Washington Post: Senate cybersecurity report finds agencies often fail to take basic preventive measures

NY Post: Yahoo e-mail customers’ names, passwords stolen

SC Magazine: Attacker extorts coveted Twitter username in elaborate social engineering scheme

FCW: Is cybersecurity the right job for you?

Security Week: Cyber Attack Leverages Internet of Things

Design News: Fuzzing Framework Fights Control Hackers

Federal News Radio: Target Breach interview with Johannes Ullrich

Careers Info Security: Top 10 InfoSec Careers Influencers

CSO Magazine: Rising impact of Target breach indicates deeper hack into systems

CBC News: Snapchat hack shows vulnerable side of smartphone apps

threatpost: Probes Against Linksys Backdoor Port Surging

Nextgov: The Ten Worst Hacks of 2013

Nextgov: Awards Recognize Best in Government Cybersecurity

Security Week: Alleged NSA Payment to RSA Raises New Fears of Gov't Undermining Crypto Security

Network World: Take the 10th annual SANS Institute Holiday Hacking Challenge

CSMonitor: Target data theft: worrying sign of cyber thieves' sophistication

threatpost: Facebook Phishing Campaign Employing Malicious Tumblr Pages

ComputerWorld: 300 victims report fake support calls to security org

Nextgov: Master's Accreditation Benefits Federal Cyber Pros

Course Review: SANS SEC 760 Advanced Exploit Development for Penetration Testers

CSO Magazine: Can we use Big Data to stop healthcare hacks?

internet evolution: IT Security Pros Click Into CyberWar

SC Magazine: The coming Internet of Things

Nextgov: Cybersecurity Experts Will Face Off in Mock NetWars

WSJ: U.S. Gives Companies Cybersecurity Guidelines to Protect Critical Infrastructure

HealthITSecurity: CISO focuses on compliance, collaboration for SANS summit

Federal News Radio: DHS, SANS Institute join forces to give agencies cyber primer

NetworkWorld: New GIAC certification advances industrial cyber security

Certification Magazine: New GIAC cert aimed at protecting industry and infrastructure

CSO Magazine: What the Internet of Things means for security

Security Bistro: The Global Industrial Cyber Security Professional Certification (GICSP) is Launching in November

NBC News: Cyber defenders are in short supply as hacking wars escalate

Control Engineering: Cyber security experiment reveals threats to industrial systems

eWeek: Cyber-Security in 2013: Software, People Still Have Vulnerabilities

ComputerWorld: Shutdown could delay government's patching of IE, Windows and .NET flaws

ComputerWorld: Adobe hack shows subscription software vendors lucrative targets

TechRepublic: Researchers reverse-engineer the Dropbox client: What it means

MIT Technology Review: Dropbox and Similar Services Can Sync Malware

CSO Magazine: CSOs: Stop flogging the threats and start providing solutions

Business News Daily: Here Comes Windows 8.1 — Should You Upgrade?

FCW: Why .gov went dark

Infosecurity: Former DHS Secretary Launches Council on Cybersecurity

Infosecurity: SANS: Internet of Things Must Drive Fresh Security Approaches

Security Bistro: Thinking About How to Secure the Internet of Things (IoT)

How to make a bazillion dollars in 2014 from Windows XP

HealthITSecurity: Engaging users to augment healthcare security training

Course Review: SANS SEC573 Python for Penetration Testers

NPR: U.S. Worries NSA Leaker's Files Could Be Hacked

So, You Wanna Be a Penetration Tester?

CSO Magazine: 5 questions with Alissa Torres, SANS Instructor and Incident Handler at Mandiant

WSJ: The Morning Download: Gas Industry Lobbies Against Cyber Standards

NetworkWorld: Security analytics will be the next big thing in IT security

CyberCity: Training Ground For The Navy SEALs Of Online Defense

CNN: America's next threat: Cyberterrorism?

Ecommerce Times: Market Jitters Hint at Social Hacks' High Threat Level

CSO Magazine: Social engineering in penetration tests: 6 tips for ethical (and legal) use

TechTarget: Trusted platform module aids Windows mobile device security

Nextgov: New Tool Can Help Agencies Assess Cyber Skills

AutomationWorld: An Education in Cyber Security

Government Technology: Colorado Embraces New IT Security Philosophy

New York Times: Luring Young Web Warriors Is a Priority. It’s Also a Game.

NetworkWorld: New course teaches techniques for detecting the most sophisticated malware in RAM only

Cybersecurity's Skills Deficiency: Paller: 'There's No Pipeline' of Deep-Knowledge Pros

InformationWeek: China Hack Attacks: Play Offense Or Defense?

SearchSecurity: Emerging threats include kinetic attack, offensive forensics: RSA 2013

CRN: 5 Most Dangerous New Hacking Techniques

Control Engineering: Michael Assante and Tim Conway offer security suggestions for plant operators

Bank Info Security: CISOs Building Credibility

New York Times: Some Victims of Online Hacking Edge Into the Light

CSO: How Colorado's CISO is revamping the state's information security -- on a $6,000 budget

Fox News: Cyber Experts Needed, But There's a Skills Gap

LA Times: Hackers target Western news organizations in China

NBC News: Cyber watchdogs worry about worker shortage

3 terrifying, but true, security tales

4 Ways to Spot an Internet Scam

A Tiny City Built To Be Destroyed By Cyber Terrorists, So Real Cities Know What’s Coming

AirForceTimes: Cybersecurity personnel to have new mission

Businessweek: The Battle to Protect Confidential Data

BYOD offers tricks and treats for enterprises, say analysts

CIO: SANS NetWars tests cybersecurity pros against peers

CNN: Scammers create fake donation websites for Sandy victims

Comprehensive Cybersecurity: Securing the Human Operating System

Course Review: SANS FOR408 Computer Forensic Investigations – Windows In-Depth

CSO: It's time to start patching the Human OS

Dark Reading: ‘CyberCity’ Faces Its First Attacks Next Month

Dice: Did Fried Brain Cells Bag John McAfee?

Forbes: The Cloud's Not-So-Secret Weak Link

Forensics: When is Data Truly Lost?

GCN: NetWars helps develop the future of cybersecurity

Hackers claim 12 million Apple IDs from FBI

InfoWorld: Eric Cole: Interview with a remarkable security guru

Inside a Forensics Investigation

IT Security Police: 'Step Away From That IE'

NetWars Tournament of Champions Tests the Skills of the Nation’s Top Cyber Security Practitioners

NetworkWorld: Want to develop cybersecurity skills? Try SANS Institute's NetWars

New Cyber Group Aims To Spread Basic Security

Potential for Sandy scams prompts warnings

SearchSecurity: Custom, targeted malware attacks demand new malware defense approach

SearchSecurity: NetWars CyberCity missions to improve critical infrastructure protection

Tool Scans for RTF Files Spreading Malware in Targeted Attacks

Washington Post: CyberCity allows government hackers to train for attacks

Whitelisting Traffic: A practical Exercise for Network Defenders

SANS CyberCon 2012: It's A Secret

Forbes: Spammers Are Using Facebook To Impersonate Your Friends

NY Post: White-hat cyberbug bounty nets cash

CIO: How to Secure Data by Addressing the Human Element

Lack of Cyber Career Paths and Training Standards Stymies Security

Google Switches On Browser Spy Cam in Chrome

Microsoft provides workarounds for Oracle vulnerability

DNS Changer: Cyber Criminals, Internet Access And The FBI

Washington Post: Cybersecurity chief urges action by Congress

DNSChanger apocalypse: Like Y2K, but even snoozier

CSO: Alan Paller on cutting through the bull

DNS Changer virus threat passes; no significant outages

Thousands risk Internet shutdown as U.S. fix expires

Botnet infections in the enterprise have experts advocating less automation

FBI Could Shut Off Servers

The AC/DC lesson: Why IPv4 will be with us a long time

Best practices for data encryption, Part 1

SANS Digital Forensics and Incident Response Summit

SearchSecurity: Password database inventory required following LinkedIn breach

InfoWeek: LinkedIn Password Breach: 9 Facts Key To Lawsuit

CSO: Advanced persistent threats can be beaten, says expert

Understanding and defeating APT, Part 2: Fighting the 'forever war' against implacable foes

Understanding and defeating APT, Part 1: Waking up to the who and why behind APT

How Ethical Hackers Make Computers Safer

SearchSecurity: Kaspersky Flame malware poses little threat to businesses

NetworkWorld: New approaches to combat 'sources of evil' and other security issues

Old remedies don’t work on new threats; SANS panel will discuss alternative medicine

Despite increased infosec spending, breaches and frustration are on the rise

3 Incident Response Essentials with Rob Lee

Interview with Ed Skoudis: SANS Cyber Guardians hack to help America win the cyberwar

Interview with SANS' Ed Skoudis: America losing the cybersecurity war to hackers

Vermont Tech student takes first place in computer skills tournament

Pitting Education Against Cyber Attacks

CIO: Mobile Malware: Beware Drive-by Downloads on Your Smartphone

SC Magazine: The six most dangerous infosec attacks

Ed Skoudis: RSA Conference Flash Talks 2012

Air Force aims to turn cyber into a career

SC Magazine: SANS builds digital certificate checker

The 10 Biggest Online Security Myths - And How to Avoid Them

CIO: How to Make Time for Continuing Education and Career Development

Mobile Device Security Expert Q&A Part II: Start treating phones as computers

Mobile Device Security Expert Q&A Part I: Where BYOD policy goes wrong

InformationWeek: 7 Ways To Toughen Enterprise Mobile Device Security

A Career in Forensics: 5 Key Steps

Implement user security awareness training

Forbes: Conversations On Cybersecurity: The Trouble With China, Part 1

Smart phones getting out of control? SANS hosts first Mobile Device Security Summit

REMnux 3 review – a treasure chest for the malware-curious

ComputerWorld Artikel: Industriekontrollsysteme ausser Kontrolle

Computerworld: Partly cloudy with a chance of hacking?

Forbes: Avoiding Heartbleed Hype, What To Do To Stay Safe