2023
05/31/2023 - The Hacker News - Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining
05/31/2023 - Help Net Security - Someone is roping Apache NiFi servers into a cryptomining botnet
05/30/2023 - The Cyberwire - Stacy Dunn: My superpower and my kryptonite. [Engineer]
05/30/2023 - CSO - Upskilling the non-technical: finding cyber certification and training for internal hires
05/30/2023 - Cardiology Advisor - FBI Report Offers Bleak Outlook on Cybercriminal Activity
05/30/2023 - Global Security Mag - Digital forensics remains a popular field
05/30/2023 - Digital First - Driving Meaningful Change in the Cybersecurity Landscape
05/30/2023 - Security Boulevard - The Human Factor in Threat Simulation: Testing Employee Awareness and Training Effectiveness
05/30/2023 - Analytics Insight - Top 5 Cyber Security Online Courses to Make a Good Pay
05/30/2023 - CSO - Armed Forces vets well-suited to cybersecurity, says UK Cyber Security Council
05/24/2023 - Dark Reading - Google's .zip, .mov Domains Give Social Engineers a Shiny New Tool
05/24/2023 - Smart Futures - Mind the OT cyber perception gap
05/24/2023 - Electronic Specifier - The shortage of skilled professionals in cyber security
05/24/2023 - CSO - UK government, SANS Institute announce Upskill in Cyber training programme for 2023
05/24/2003 - MSSP Alert - Top 12 vCISO Influencers You Need To Be Following
05/24/2023 - Gaming Deputy - TOP 25 worst iPhone passwords that crack 25% of all Apple smartphones + Poll
05/23/3023 - TahawulTech - Government leaders from IT sector honoured at GovTech Innovation Awards
05/23/2023 - Security Middle East Magazine - SANS Institute to Host 3rd Bahrain Cyber Reskilling Program
05/22/2023 - Wall Street Journal Pro - Your Data Just Leaked. Here’s What Happens Next
05/22/2023 - People of Color in Tech - New SANS Program For BIPOC, Women Brings Cybersecurity To Life Through Hacking Games
05/22/2023 - TechNative - Five ways to keep industrial control systems safe from cyberattacks
05/21/2023 - TechTarget - The potential danger of the new Google .zip top-level domain
05/19/2023 - IT Brew - How Google’s .zip domains help phishers
05/19/2023 - Renal & Urology News - FBI Report Offers Bleak Outlook on Cybercriminal Activity
05/19/2023 - Cybersecurity Insiders - Phishing-resistant MFA 101: What you need to know
05/19/2023 - ATT Cybersecurity - Phishing-resistant MFA 101: What you need to know
05/19/2023 - Our Today - A guide to cybersecurity incident response
05/19/2023 - The Informant - There are 1480 alternatives to .com. The worst has just happened to your safety
05/18/2023 - Information Week - Why Defending Modern Cloud-Based Enterprises Must Start With ZTA
05/18/2023 - DazeInfo - Focus Your Cybersecurity Degree With These Specializations
05/17/2023 - CyberSecurityNews - Hackers are Actively Using the new.zip Domain for Malicious Attacks
05/17/2023 - El Pais - Alexa will employ AI to get promoted to butler of the household
05/17/2023 - Ampere News -Energy workers in Ukraine battle to stay alive & block digital snipers
05/17/2023 - Security Boulevard - ChatGPT: Friend or Foe?
05/16/2023 - Newsweek - Pentagon hacking fears fueled by Microsoft's monopoly on military IT
05/16/2023 - Help Net Security -Google Cloud CISO on why the Google Cybersecurity Certificate matters
05/16/2023 - Financial Post - OpenAI CEO testifies before U.S. Senate Judiciary Subcommittee, calls for regulation of AI
05/16/2023 - Upper Michigan Source - UP High schoolers earn cybersecurity scholarship
05/15/2023 – Wall Street Journal Pro - How Tabletop Exercises Aid Cyber Preparedness
05/15/2023 - Spyware News - Let’s Address the Cybersecurity Careers Gap
05/15/2023 – MSSP Alert – Market News May 15
05/15/2023 - Intelligent CIO - Ensuring effective cybersecurity in the retail sector
05/12/2023 - Marketing Resource Directory - SANS INSTITUTE — A Cyber Security Company With a Bold Look
05/12/2023 – Enterprise Storage Forum - Best Cybersecurity Certifications 2023
05/11/2023 - Medium - No More Missed Opportunities: Maximizing Your Threat Hunting Efforts
05/11/2023 - Medium - 5 Best Practices for Secure Code Review: Strategies, Examples, and Tools
05/10/2023 - Government Technology - How Two States Are Bridging Talent Gaps and Growing Their Workforce
05/10/2023 - Information Week - 12 Ways to Approach the Cybersecurity Skills Gap Challenge in 2023
05/10/2023 - IT Brew - IPs for sale: Proxyjackers scale up operations, from residential to cloud
05/10/2023 - SC Magazine - How to tackle the cybersecurity careers gap
05/09/2023 - Business Telegraph - RSA Conference 2023: Unity + Basics = Security
05/09/2023 - The Penninsula - SANS Institute enhances cybersecurity skills in Qatar
05/08/2023 - MIT Technology Review - How to hack a smart fridge
05/08/2023 - IT Web - South Africa needs to bring cyber security into school curricula
05/05/2023 - HIT Consultant - IT Infrastructure: Creating A Culture of Security In Your Hospital & Health System
05/04/2023 - Federal News Network - CISA’s draft attestation form raises key questions about software security push
05/04/2023 - TechNewsWorld - Could Bartenders Close the Tech Skills Gap in Cybersecurity?
05/04/2023 - Continuity Central - Don’t ignore the rising threat of software supply chain attacks…
05/4/2023 - Security Boulevard - How Cyolo Empowers its Partners to Support Secure IT/OT Convergence
05/03/2023 - Security Boulevard - RSA Conference 2023: DevSecOps and The Future Of Security
05/03/2023 - Continuity Central - The five most dangerous new cyber attack techniques
05/03/2023 - Daily Record - Md. cybersecurity group lands Alan Paller Laureate Program grant
05/02/2023 - Mesa Online - AWS: The Importance of Next-Gen Firewalls to Companies’ Security Strategies
05/02/2023 - SpiceWorks - World Password Day 2023: Tech Leaders Discuss Critical Threats and Best Practices
05/02/2023 - Express Computer - SANS Reports Highlight the Need for DNS to Drive SecOps Efficiency in a World of Multicloud
05/02/2023 - WhatsYourTech.ca - Cybersecurity Training Aimed at Women, New Canadians, Career Changers and BIPOC individuals
05/01/2023 - SiliconAngle - At RSA Conference, tales of real-world cyberattacks and warnings of fearsome new threats
05/01/2023 - DataBreachToday - The 5 Most Dangerous New Attack Techniques
04/29/2023 - Converge! Network Digest - RSA 2023 attendance topped 40,000
04/28/2023 - SpiceWorks - RSAC 2023 Spotlight: AI, Innovation Sandbox, Top New Attack Techniques and More
04/28/2023 - SourseSecurity (UK) - RSAC 2023 keynote session: SANS analysts unveil top five new attack techniques to watch
04/28/2023 - CSO - 5 ways threat actors can use ChatGPT to enhance attacks
04/27/2023 - Romanian Security Team Forum - #RSAC: Organizations Warned About the Latest Attack Techniques
04/27/2023 - Dark Reading - SANS Reveals Top 5 Most Dangerous Cyberattacks for 2023
04/27/2023 - IT Business / ITWorld Canada - RSA Conference 2023: How hackers can fool ChatGPT’s defences to create ransomware
04/27/2023 - CSO - 5 most dangerous new attack techniques according to SANS Institute analysts
04/27/2023 - SDX Central - 5 most dangerous new attack techniques (yes, they include AI)
04/27/2023 - InfoSecurity - #RSAC: Organizations Warned About the Latest Attack Techniques
04/27/2023 - SiliconAngle - Ocean’s roar of generative AI and expanding dark web capture security world’s attention at RSA
04/27/2023 - Electronic Specifier - Analysts unveil top five new attack techniques to watch
04/27/2023 - Trucks, Parts, Service - Karmak shares what it learned after being victimized by ransomware attack
04/26/2023 - Intelligent CIO - SANS Institute to enhance cybersecurity skills in Qatar through SANS Doha May 2023
04/24/2023 - Security Intelligence - The Needs of a Modernized SOC for Hybrid Cloud
04/21/2023 - Payments Journal - UK Small Business Are Prioritizing Cyber Security Less
04/20/2023 - Spiceworks - What To Expect at the 2023 RSA Conference
04/19/2023 - International Business Times - Small businesses revealed to no longer prioritise cyber security measures
04/18/2023 - Campus Technology - SANS Institute and Google Partner on Cloud Diversity Academy
04/18/2023 - TechTarget - What it takes to be a DevSecOps engineer
04/17/2023 - Maxbit - Silicon Valley Bank Customers Are Vulnerable to Crypto Scams
04/17/2023 - CertMag - Cybersecurity Survey Extra: Cybersecurity certification training materials
04/14/2023 - TechTarget - Pen testing amid the rise of AI-powered threat actors
04/13/2023 - Supply Chain Dive - 3 ways to bolster supply chain cybersecurity as attacks accelerate
04/13/2023 - CIO - Why IT leaders are putting more business pin on security spend
04/12/2023 - SC Magazine - Five ways CISOs can succeed
04/12/2023 - Mindset3 - Stop the World, Need to Think …
04/10/2023 - ITWorldCanada - Cyber attack hits PC maker MSI, another GoAnywhere MFT victim and more
04/10/2023 - GridinSoft - Hackers Infect eFile Tax Filing Service with Malware
04/07/2023 - Yahoo News - What do AI chatbots know about us, and who are they sharing it with?
04/07/2023 - Engadget - What do AI chatbots know about us, and who are they sharing it with?
04/06/2023 - Security Boulevard -Top 10 Cyber Threat Intelligence Certifications for 2023
04/06/2023 - Security Buyer - Women In Cybersecurity And Tech
04/05/2023 - WSJ Pro Cybersecurity Newsletter - IRS tax-filing service has malware
04/05/2023 - Laptop Mag - Free tax filing software caught spreading malware — have you been using it?
04/05/2023 - TechTarget - ICS kill chain: Adapting the cyber kill chain to ICS environments
04/04/2023 - Cowboy State Daily - IRS-Authorized eFile.com Has Exposed Some Wyomingites’ Computers To Malicious Trojan Horse Virus
04/04/2023 - SC Magazine - JavaScript malware infects eFile.com tax-return service since mid-March
04/04/2023 - PC Magazine - Tax Prep Site eFile.com Delivered Malware to Users for Weeks
04/04/2023 - Bleeping Computer - IRS-authorized eFile.com tax return software caught serving JS malware
04/04/2023 - Silicon Angle - IRS-approved tax filing site eFile.com found delivering malware to users for a week
04/04/2023 - Global Security Mag - Hintertür in 3CX-VoIP-Software
04/04/2023 - Gulf Business - Women in tech: Heather Mahalik, fellow instructor at Sans Institute
04/04/2023 - Gulf News - SANS Institute recognized for educating the UAE’s cybersecurity industry with dual award win
04/03/2023 - CSO Online - 5 strategies to manage cybersecurity risks in mergers and acquisitions
04/03/2023 - CRN - 3CX Attack Shows The Dangers Of ‘Alert Fatigue’ For Cybersecurity
03/31/2023 - CRN - 3CX Supply Chain Attack: Big Questions Remain
3/31/2023 - Forbes - World Backup Day Is A Reminder To Back Up Your World
03/31/2023 - Security Informed - SANS And Veritas Security Experts Comment On Data Categorization Ahead Of World Backup Day
03/31/2023 - Hacker News - Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
03/31/2023 - The CyberWire - Creating Connections: Agents of change
03/30/2023 - The Washington Post - Think ransomware gangs won't thrive this year? Think again, experts say
03/30/2023 - The Daily Tribune News of Bahrain - Tamkeen supported 3,500 Bahrainis and 1,217 enterprises in two months
03/29/2023 - Intelligent CISO - Cloud security improving all the time
03/29/2023 - SpiceWorks - World Backup Day 2023: The Importance of Proactive Measures to Prevent Data Loss and Theft
03/28/2023 - CyberWarzone - What is an Incident Response Retainer Service? A Detailed Guide
03/27/2023 - Enterprise Channels MEA - CISOs getting a seat at the boardroom to discuss security budgets, said Michael Heering
03/27/2023 – Dubai Forum - CISOs getting a seat at the boardroom to discuss security budgets, said Michael Herring
03/27/2023 – Security Review - Video: SANS Institute Focuses on Cyber Security Training to Bridge the Skills Gap at GISEC 2023
03/23/2023 - VentureBeat - Analysts share 8 ChatGPT security predictions for 2023
03/23/2023 - MSSP Alert - Educational Programs to Enhance Diversity in the CyberSecurity Profession
03/22/2023 - IT Brew - Document, document, document: How to keep patching going when the patch pro leaves
03/20/2023 - Tahawul Tech - Michael Heering of SANS Institute, on why soft skills are important for cybersecurity
03/20/2023 - Express Computer - Ransomware and Malware Intrusions in 2022 (And Preparing for 2023!)
03/20/2023 - SecureMac - Bad guys roll out SVB scams—over the weekend!
03/18/23 - Cyberwire - The fall of Silicon Valley Bank and its aftermath. Threat actor movements. Crime and punishment
03/18/2023 - Security Boulevard - No More Missed Opportunities: Maximizing Your Threat Hunting Efforts
03/17/2020 - ChannelPro - SANS Institute Partners With Google To Launch Cloud Diversity Academy
3/16/2023 - CXO DX - Michael Heering, Marketing Director, Global Field Marketing, SANS Institute spoke to CXO DX at GISEC
03/16/2023 – Making Space - Women in Cybersecurity You Need to Know
03/15/2023 - The Washington Post - Silicon Valley Bank collapse poses challenge for cybersecurity defenders, firms
03/15/2023 - Security Boulevard - Cybersecurity Circular: Threat Vectors Arising from #SVBCollapse
03/15/2023 - CSO - Cybercriminals target SVB customers with BEC and cryptocurrency scams
03/15/2023 - Hacker Noon - What Is the GIAC Penetration Tester (GPEN) Certification?
03/15/2023 - The Register - SVB collapse's mix of money, urgency and uncertainty makes it irresistible to scammers
03/15/2023 - CyberSecurity Connect - Hackers Jump on SVB Bank Crash
03/14/2023 - Bleeping Computer - Cybercriminals exploit SVB collapse to steal money and data
03/14/2023 - Engadget - It took a TikToker barely 30 minutes to doxx me
03/13/2023 - Synopsos - DevSecOps uses policy to take the pressure off testing
03/09/2023 - Medium - Getting Started in Cybersecurity Careers: A Step-by-Step Guide to Start a Career in Cybersecurity
03/09/2023 - Dark Reading - 5 Critical Components of Effective ICS/OT Security
03/09/2023 - Security MagazineME - SANS Institute Announces Student-Company Networking Event
03/08/2023 - Dice - Cyber Security Training: The Best Courses and Where to Start
03/08/2023 - Cybersecurity ASEAN - Take the Pressure off Coding for Your Developers
03/08/2023 - CSO - SANS, Google launch academy to promote cloud security, diversity in workforce
03/08/2023 - SpiceWorks - Women’s Day 2023: Tech Leaders Discuss the Impact of Digital Gender Gap
03/08/2023 - Security MEA - Growing Number of Women in Cybersecurity
03/08/2023 - Intelligent CIO - Supercharging cybersecurity with SANS Institute at GISEC 2023
03/08/2023 - Enterprise Channel MEA - SANS Institute to demonstrate entire product portfolio at GISEC
03/08/2023 - Help Net Security - SANS Institute and Google collaborate to launch Cloud Diversity Academy
03/07/2023 - Insight - Supercharge Your Cybersecurity With SANS Institute At GISEC 2023
03/07/2023 - CSO - What is zero trust? A model for more effective security
03/07/2023 - People of Color in Tech - Google And SANS Launch Cybersecurity Academy For BIPOC As Biden Unveils National Strategy
03/07/2023 - Dark Reading - Key Proposals in Biden's Cybersecurity Strategy Face Congressional Challenges
03/06/2023 - FutureTech - SANS Institute to Show Off its Advanced Suite of Cybersecurity Offerings
03/03/2023 - Medium - How to Get Started With Cybersecurity
03/02/2023 - Test Out Certification Magazine - Salary Survey Extra: Give us more [Fill in the blank] vendor-neutral certs
02/24/2023 - Business News Daily - SANS GIAC Certification Guide: Overview and Career Paths
02/10/2023 - SC Magazine - For ISO 27001 compliance, test application security across your SDLC02/09/2023 - Politico - West Wing Playbook
02/08/2023 - Security Middle East Magazine - Second Phase of Cyber Reskilling Programme Launches in Bahrain
02/08/2023 - Film Daily - Cyber Security Trends and Careers in 2023
02/08/2023 - InformationWeek - A Week of Rampant Ransomware: Breaking Down Ion, VMware Attacks
02/07/2023 - Medium - Cybersecurity For Small Businesses: Protecting Your Most Valuable Assets
02/07/2023 - Security Boulevard - A Primer on Firewall Policy Management
02/06/2023 - IT World Canada - Ransomware is targeting VMware’s hypervisor, hospitals are attacked and more
02/06/2023 - HIMSS - Healthcare Cybersecurity Solutions and Simulations at HIMSS23
02/06/2023 - MSSP Alert - Today’s MSSP, MDR, XDR and Cybersecurity Market News
02/03/2023 - TechTarget - How to build an incident response plan, with examples, template
02/02/2023 - The Fordham Ram - The 12 Best Cyber Security Courses In 2023: Stay Safe Online
02/02/2023 - Charged Retail - JD Sports cyber attack: why online retail is vulnerable and what can be done?
02/02/2023 - Bank Info Security - Why COVID-19 Made Leaders Realize Just How Connected OT Networks Really Are
02/01/2023 - SecurityWeek - Cyber Insights 2023: The Geopolitical Effect
01/31/2023 - CisoSeries - People Aren’t the Weakest Link. They’re the Number One Attack Vector
01/31/2023 - Tahawultech - Feature: Data Privacy Day
01/30/2023 - Forbes - JD Sports Group Hacked - What 10 Million Customers Need To Know
01/30/2023 - Evening Standard - Ten million customer accounts at risk as JD Sports falls victim to cyber attack
01/30/2023 - The Register - JD Sports admits intruder accessed 10 million customers' data
1/19/2023 - Perception Point - What Is Incident Response? Complete Guide for Enterprises [2023]
1/18/2023 - National Cybersecurity - Cybersecurity Top Priority at WAPA as Employees Begin GFACT Certification
1/18/2023 - Yahoo! Finance - ZeroFox Puts Spotlight on Executive Protection with SANS Webinar
1/18/2023 - Insight SC Magazine UK - How to stop burnout in your teams
1/15/2023 - Real Security - SANS CyberThreat: an inside track on Europe’s premier cyber security conference
1/12/2023 - Security Boulevard - Certifications to Look for When Choosing a Pen Testing Team
1/12/2023 - Medium - Top 8 Cyber Security Certifications for 2023: Entry Level, Pen Tester, & Expert Level
1/12/2023 - Binance - Local Authorities Reportedly Raid Nexo’s Bulgarian Office
1/12/2023 - Morphisec - HOW SECURE ARE YOUR LEGACY SYSTEMS
1/12/2023 - Tenable - Google: Monitor These Emerging Cloud Security Challenges in 2023
1/11/2023 - IT News - Microsoft sends security admins their first gift for 2023
1/9/2023 - Charbelnemnom - How to Become A Cybersecurity Specialist? 5 Things to Know
1/9/2023 - Freedom Hacker - Top 5 Free Websites to Learn Hacking this 2023
1/6/2023 - Tanium - 5 Myths—and Realities—About Cyber Insurance
1/6/2023 - Redmond Mag - Microsoft Adds More User Phishing Details to Attack Simulation Training Service
1/4/2023 - Financial Post - Cybersecurity Year in Review for 2022: A lack of resilience
1/4/2023 - Digital Journal - Online Cyber Security Training Services Market 2023 Strategic Assessments – Optiv, Fortinet, Terranova Security (Fortra)
1/3/2023 - WhaTech - Software Defined Security Market scrutinized in the new analysis
1/3/2023 - Oasis Discovery - The Dark Side of ChatGPT: How AI is Changing the Lands
1/2/2023 - QuickTelecast - Ukraine Hacks Add To Worries Of Cyber Conflict With Russia
1/2/2023 - National Cyber Security - How a recession will change the cybersecurity landscape
2022
12/31/2022 - JBKlutse - Top 10 online IT training websites
12/30/2022 - Tenable - Cybersecurity Snapshot: Key 2022 Data for Cloud Security, Vulnerability Management, EASM, Web App Security and More
12/30/2022 - CIO - 10 IT certifications paying the highest premiums today
- 12/16/2022 – Tech Target -Top 12 online cybersecurity courses for 2023
- 12/16/2022 – Forbes - Security Professionals Advise On How To Improve The Security Operations Center
- 12/16/2022 – Eye of Dubai - SANS Institute Wins Best Cybersecurity Training Provider of the Year at Future Security Awards 2022
- 12/16/2022 – Tripwire - Latest Cyber Guidance for Retailers from NCSC
- 12/14/2022 – Coin Desk - Defense Against the Dark Arts: Cybersecurity With Limaris Torres
- 12/12/2022 – IT World Canada - Cyber Security Today, Dec. 12, 2022 – Toronto hacking contest ends with 63 zero day bugs, and more
- 12/12/2022 – SC Magazine - How MDR can improve threat hunting: An SC eBook preview
- 12/12/2022 – Specialty Chemicals Magazine - Feature article - Rogue employees: The insider menace
- 12/11/2022 – This Week in 4n6 – Week 50 – 2022
- 12/11/2022 – Industrial Cyber - Cybersecurity risks in US critical infrastructure sector call for better skills, technologies, processes
- 12/11/2022 – NCX group - Don’t take risks when it comes to data security
- 12/09/2022 – IT World Canada - Some models of Cisco IP phones have high-severity vulnerability
- 11/28/2022 – The Register - SANS Institute bags award at Future Security Awards 2022
- 11/28/2022 – Khalee Times - SANS Institute bags award at Future Security Awards 2022
- 11/28/2022 – Global Security Magazine - SANS Institute Wins Best Cybersecurity Training Provider of the Year at Future Security Awards 2022
- 11/28/2022 – Zawya - SANS Institute wins Best Cybersecurity Training Provider of the Year at Future Security Awards 2022
- 11/25/2022 – VentureBeat - ‘Quiet quitting’ poses a cybersecurity risk that calls for a shift in workplace culture
- 11/25/2022 – Future IoT - Securing the critical to secure
- 11/24/2022 – CNBC – U.S. shoppers alone in boosting Black Friday spend as cost-of-living crisis hits Europe
- 11/24/2022 – Busy Continent - China cyber espionage expert to host ‘cyber war games’ in Australia
- 11/23/2022 – Construction Dive - Security awareness training needs a revamp
- 11/23/2022 – IT World Canada - 23, 2022 – Lessons from the hack of officials in Moldova, a different phone scam and a warning about an abandoned web server
- 11/23/2022 – Help Net Security - Here’s how to make sure your incident response strategy is ready for holiday hackers
- 11/22/2022 – Cybersecurity Dive - Security awareness training needs a revamp
- 11/22/2022 – Dark Reading - Adversarial AI Attacks Highlight Fundamental Security Issues
- 11/22/2022 – Brad Engeland Blog - Cybersecurity Training Needs Revamping
- 11/22/2022 – The Hacker News - Here's How to Ensure Your Incident Response Strategy is Ready for Holiday Hackers
- 11/21/2022 – The Register - Cyber security pros: move to the next level next year
- 11/21/2022 - TechGenix - 5 Must-Have Email Security Policies for Your Business
- 11/21/2022 – Finance Digest - How to press cancel on the threat of subscription-style ransomware services
- 11/20/2022 – Gulf News - Why Wales is a compelling destination for foreign investment
- 11/20/2022 – The Free Library - Why Wales is a compelling destination for foreign investment.
- 11/20/2022 – The Register - Google looking outside the usual channels to fix security skills gap
- 11/20/2022 – Head Topics UK - Google cloud wants CISOs to do more about diversity
- 11/20/2022 - Ex Bulletin - Google Cloud Wants CISOs To Do More About Diversity
- 11/18/2022 – Global Security Mag - Cyber Security Trends 2023
- 11/18/2022 – Source Security - Barclays says Black Friday scams on rise
11/09/2022 - Cyberwire - A look back at midterm cybersecurity
- 11/09/2022 - The Sun - Millions of PC owners warned by Microsoft to fix 10 ‘critical’ problems today
- 11/09/2022 - IT World Canada - SolarWinds to pay US$26 million over Orion compromise
- 11/09/2022 - Financial Post - SolarWinds to pay US$26 million over Orion compromise
- 11/08/2022 - Bloomberg - Hacked Australian Health Insurer Data Posted to Dark Web
- 11/07/2022 - CSO - How to prepare for a SOC 2 audit – it’s a big deal, so you’d better get ready
- 11/07/2022 - ITWeb (ZA) - Ransomware as a service: A new wrinkle on an old threat
- 11/07/2022 - Grit Daily News - Most Hackers Need 5 Hours or Less to Break Into Enterprise Environments
- 11/06/2022 - Business Telegraph - Home Affairs removes “out-dated” priority migration list as tech sector concerns mount – The Mandarin
- 11/4/2022 – Tenable Blog - Cybersecurity Snapshot: Salary Trends, Ransomware Summit, Next-gen MFA
- 11/4/2022 – Smart Company (AU) - Home Affairs removes “out-dated” priority migration list as tech sector concerns mount
- 11/3/2022 – Techzine (EU) - ‘Cyber threats increase due to Russia’s attack on Ukraine’
- 11/2/2022 – Dark Reading - The Sky Is Not Falling: Disclosed OpenSSL Bugs Are Serious but Not Critical
- 11/2/2022 – SME Web - Solving the people problem: How to put people first in cybersecurity
- 11/2/2022 – IT World Canada - OpenSSL vulnerability now rated ‘high’ but should be taken seriously
- 11/2/2022 – Cyber News - Engineering Workstations Used as Initial Access Vector in Many ICS/OT Attacks: Survey
- 11/1/2022 – IT Wire - Nozomi Networks-sponsored SANS survey finds security defences are getting stronger as cyber threats to OT environments remain high
- 11/1/2022 – Cybersecurity Dive - Critical OpenSSL vulnerability causes security industry to hold its breath
- 11/1/2022 – Equip Global - Season 2, Episode 6: Cyber Law, Cybersecurity, and Whistleblowers. A Conversation with Ben Wright – Part 1
- 11/1/2022 – Cyber News - Industrial providers ramp up cyber risk posture as OT threats evolve
- 11/1/2022 – Security Week - Engineering Workstations Used as Initial Access Vector in Many ICS/OT Attacks: Survey
- 11/1/2022 – Security Magazine - OT/ICS cybersecurity threats remain high
- 11/1/2022 – Duo - OPENSSL 3.0.7 FIXES TWO BUFFER OVERFLOWS
- 10/31/2022 – The CyberWire - Creating Connections: Inspired and connected
- 10/31/2022 – The Register (UK) - Singapore hosts ICS/OT cybersecurity training extravaganza
- 10/31/2022 - CSO Online - Engineering workstation attacks on industrial control systems double: Report Nozomi Networks survey
- 10/31/2022 – Dice - Cybersecurity Career Path: How to Start and Grow
- 10/28/2022 – Decipher - OPENSSL TO FIX CRITICAL FLAW
- 10/28/2022 – SC Media - More than one-third of OT/ICS organizations lack visibility into their networks
- 10/28/2022 – HealthCareIT News - Cyberwarfare against health systems: The nation-state threat
- 10/28/2022 – Axios - CISA outlines cyber fixes critical infrastructure can afford to fix
- 10/21/2022 – SC Magazine – Experts on securing the public cloud
- 10/21/2022 – Data Center Knowledge - What is Quantum Computing and What Does It Have to Do with Encryption?
- 10/20/2022 – London Daily News (UK) - 2FA could make the secure way the easy way — if we’d let it
- 10/20/2022 – The Register - Cloud migration and the cyber skills shortage
- 10/19/2022 – eSecurity Planet - Best Digital Forensics Tools & Software for 2022
- 10/19/2022 – HelpNetSecurity - Upgrade your security awareness efforts: Here’s how to start
- 10/19/2022 – Pro Publica - How the FBI Stumbled in the War on Cybercrime
- 10/19/2022 – CPO Magazine - Fortinet Disclosed a New Authentication Bypass Critical Vulnerability Being Exploited in the Wild
- 10/19/2022 – Gulf Business - Solving the people problem: How to put people first in cybersecurity culture
- 10/18/2022 – Cybersecurity Dive - Struggling to find cyber pros? Look to your network admins
- 10/18/2022 – IT Pro Today - How Leidos Tackled Cybersecurity Skills Shortage Through Education
- 10/18/2022 – The Register - Build some flexibility into your cyber learning
- 10/17/2022 – HelpNetSecurity - Microsoft and SANS Institute collaborate to equip security professionals with the necessary expertise
- 10/17/2022 – IT World Canada - Cyber Security Today, Oct. 17, 2022 – Warnings to VMware and Office 365 administrators
- 10/17/2022 – Medium.com – Takeaways, learnings, and cool finds from AISA CyberCon 2022 — Part 1
- 10/17/2022 – Raconteur – Data and Analytics: the new defenses against cyber threats
- 10/17/2022 – AiThority.com – SANS Institute Announces Partnership with Microsoft
- 10/17/2022 – TechNative - Modernising SecOps: It’s time to unpick the complex matrix
- 10/16/2022 – This Week in 4n6 - Week 42, 2022
- 10/16/2022 – Channel Asia – 7 critical steps for successful security on-boarding
- 10/14/2022 – IT Brew - ‘MFA fatigue’ pushes momentum for more secure factors
- 10/12/2022 - Develop.Secure.Software - Packagist PHP repo supply chain attack: 3 key takeaways
- 10/12/2022 - Spiceworks - Moving Cybersecurity Forward: Takeaways from International Cyber Expo 2022
- 10/12/22 –KnowBe4 - Three-Quarters of Ethical Hackers Can Collect and (Potentially) Exfiltrate Data in 10 Hours or Less
- 10/11/22 –Security Week - Fortinet Confirms Zero-Day Vulnerability Exploited in One Attack
- 10/10/2022 - CIODive - Struggling to find cyber pros? Look to your network admins
- 10/7/22 –Cybersecurity Dive - Incident responders report alarming rates of mental strain
- 10/6/22 –Security Boulevard – Your Security Guide to Insider Threats: Detection, Best Practices, Solutions
- 10/6/22 –TechTarget - SearchSecurity – DEFINITION: incident response
- 10/6/22 -Macleans - Five things you didn't know you could study at college
- 10/5/2022 - CRN - 10 Hot Cybersecurity Certifications In 2022
- 10/5/22 –iTechpost - Optus Confirms Data Breach; 2.1 Million Government ID Numbers are Exposed
- 10/5/22 –Tech Native (UK) - Seven steps security awareness professionals can take to ensure vital leadership support
- 10/3/2022 - News-dayFR (FR) - Exploitez les vulnérabilités en moins de temps
- 10/3/22 –SC Media – Why human nature often trumps security
- 10/2/22 –Forbes - For Cybersecurity Awareness Month (and Halloween) – Some Scary Cyber Threat Stats
- 10/1/2022 – The Register (UK) - Gone in a day: Ethical hackers say it would take mere hours to empty your network
- 10/1/22 –Medium – Top Free Cybersecurity Courses with Certifications
- 9/30/2022 – The CyberWire - DPRK weaponizes open-source software. SolarMarker is back. A case of account hijacking. Deepfakes. Hybrid war update.
- 9/30/2022 – The Daily Swig - Bug Bounty Radar // The latest bug bounty programs for October 2022
- 9/29/2022 – Security Boulevard - The Week in Security: CISA Director tasked with responsibility for open source software security
- 9/29/2022 – Enterprise Security Tech - SANS Launches OnDemand Cyber Training Updates in an Effort to Close the Cybersecurity Training Gap
- 9/29/2022 – Gulf News (ME) - SANS Institute: Benchmark in cybersecurity training solutions
- 9/29/2022 – CSO Magazine - Most hackers need 5 hours or less to break into enterprise environments
- 9/28/2022 – The Guardian (UK) - Optus data breach: everything we know so far about what happened
- 9/28/2022 – Security Week - Report Shows How Long It Takes Ethical Hackers to Execute Attacks
- 9/28/2022 – FreedMaxick - How Vulnerable is Your Business to a Cyberattack?
- 9/28/2022 – The Eyeopener - CYBERSTART CANADA TEACHES GIRLS AND NON-BINARY YOUTH ABOUT CYBERSECURITY
- 9/28/2022 – CXO Insight – SANS Institute Launches Updated OnDemand Training Platform
- 9/28/2022 – Security Buyer - Celebrating 15 Years Of Online Training
- 9/28/2022 – Dark Reading - Most Attackers Need Less Than 10 Hours to Find Weaknesses
- 9/28/2022 – FE News UK - Unlocking cyber skills: This year’s essential back-to-school lesson plan
- 9/27/2022 – Forbes Advisor - How To Become A Cybersecurity Specialist
- 9/27/2022 – SC Magazine - SC eBook preview: Top 5 public cloud infrastructure challenges
- 9/27/2022 – Internet Digital Entrepreneur - Cybersecurity & InfoSec —Career Transformation Guide (2022 v2)
- 9/27/2022 – UPenn Almanac - One Step Ahead: Celebrating 2022 National Cybersecurity Awareness Month at Penn
- 9/26/2022 – Built In - 12 Penetration Testing Certification Options to Know
- 9/25/2022 – The Australian (AU) – What Optus customers should do now to protect security after data breach
- 9/23/2022 – TechRepublic - Training the next generation of cybersecurity experts to close the crisis gap
- 9/23/2022 – Enterprise Channels - SANS Cyber Safari 2022 training programme in Riyadh from October 1 to 13
- 9/23/2022 – IOT-Now.com - CrowdStrike debuts Falcon Discover for IoT to gain visibility, reduce risk across IoT, OT environments
- 9/22/2022 – Security Boulevard - Overheard at the SANS Security Awareness Summit 2022
- 9/21/2022 – IT Web - SANS 2022 Security Awareness Report: Managing human risk
- 9/21/2022 – Tahawultech.com - Winners list for the Future Security Awards 2022 unveiled
- 9/21/2022 – Canadian Investor – 9 Habits that lead to successful cyber security
- 9/20/2022 – Security Info Watch - Ransomware as a Service: A new wrinkle on an old threat
- 9/20/2022 – Security Info Watch – John Pescatore
- 9/20/2022 – World News Era - 10 Best Cybersecurity Training Options
- 9/20/2022 – Microsoft Blog - New Windows 11 security features are designed for hybrid work
- 9/20/2022 – Healthcare Info Security - Digital Bank Revolut Confirms Customer Data Breach
- 9/20/2022 – InfoRisk Today - Digital Bank Revolut Confirms Customer Data Breach
- 9/20/2022 – Troy media - 9 habits that lead to successful cyber security
- 9/20/2022 – Cryptosaraus - Ransomware as a Service: A New Wrinkle on an Old Threat
- 9/20/2022 – Small Business Trends - 10 Best Cybersecurity Training Options
- 9/19/2022 – Maryland Daily Record - Free training and certification available through SANS Cyber Workforce Academy
- 9/18/2022 – This Week in 4n6 – Week 38
- 9/16/2022 – Security Buyer – SANS Brings Cyber Safari Training
- 9/16/2022 – Medium - What is Incident Response Plan?
- 9/16/2022 – Channel Pro Network - 6 Best Certifications for Ethical Hackers To Boost Your IT Career
- 9/16/2022 – Hedenbridge News - Are Price-Conscious Workers Creating Security Gaps in Your Organization?
- 9/16/2022 - The Register (UK)– Security – Turbo Boost your career in cybersecurity
- 9/16/2022 – E&T – EU and US authorities move to strengthen cyber-security protections
- 9/15/2022 – Cyber Security Intelligence - Using SAST To Prevent Zero Day Vulnerabilities
- 9/15/2022 – IT News - Four remote code execution bugs in Microsoft's September Patch Tuesday
- 9/15/2022 – BollyInside - How to Get Started in Cybersecurity
- 9/15/2022 – Blackberry Blog - Remote Employees and Cybersecurity: Are Price-Conscious Workers Creating Security Gaps in Your Organization?
- 9/14/2022 – That Grumpy BSD Guy - Open Source in Enterprise Environments - Where Are We Now and What Is Our Way Forward?
- 9/14/2022 – Industrial Cybersecurity Pulse - Protecting the digital manufacturing supply chain while promoting innovation
- 9/14/2022 – Control Engineering - Protecting the digital manufacturing supply chain while promoting innovation
- 9/14/2022 – Plant Engineering – Protecting the digital manufacturing supply chain while promoting innovation
- 9/13/2022 – Medium.Com – Zero Trust Architecture (ZTA): A Primer
- 9/13/2022 – The Register - How to get inside the mind of hackers
- 9/13/2022 – Security Boulevard – SANS Analyst Program, “Fighting Back Against Compromised Credentials”
- 9/13/2022 – Protocol Enterprise (Newsletter) – The threat-intelligence whisperer
- 9/13/2022 – Protocol – How Katie Nickels helped transform how we talk about cyber defense
- 9/13/2022 – Techxmedia – SANS brings Cyber Safari to Saudi Arabia
- 9/12/2022 – IT Web – Why cyber security should be at the top of the curriculum this new school year
- 9/11/2022 – This Week in 4n6 – Week 37
- 9/10/2022 – Cyber Security News - Hackers Using Red Teaming Tools to Connect with C&C Servers After an Initial Compromise
- 9/10/2022 - DISC Infosec blog – A Rough Guide to Launching a Career in Cybersecurity
- 9/9/2022 – CSO Magazine - The CSO guide to top security conferences
- 9/9/2022 – Tenable Blog – Cybersecurity Snapshot: 6 Things That Matter Right Now
- 9/9/2022 – Forensic Focus – Preparing for Court Testimony: What Happens When You Press That Button?
- 9/8/2022 – Information Security Buzz – WH Smith Sales Affected By April Cyber Attack – SANS Comment
- 9/8/2022 – Teiss – Ransomware as a Service
- 9/8/2022 – Los Angeles Daily News – LAUSD not out of woods with cyberattack, security experts say
- 9/7/2022 – The CyberWire – Albania attributes major cyberattack to Iran. TikTok denies breach. New Linux malware.
- 9/7/2022 – Security Management Magazine – Security Controls: Understanding How they Fail Can Improve your Security
- 9/7/2022 – The Daily Swig – A rough guide to launching a career in cybersecurity
- 9/7/2022 – The CyberWire – Control Loop
- 9/7/2022 – Academia Group – TMU Rogers Cybersecure Catalyst launches cybersecurity learning experience for youth
- 9/6/2022 – Computer Weekly – Bus company Go-Ahead fighting off cyber attack
- 9/6/2022 – Tech Circle - Cybersecurity, data privacy top ‘people-related’ risks: Report
- 9/6/2022 – Cyble - Adversaries Actively Utilizing PowerShell Empire
- 9/6/2022 – Dynamic Business - Let’s Talk: Is it possible to build a human-centered business in the era of the machine?
- 9/4/2022 – This Week in 4n6 – Week 36 – 2022
- 9/2/2022 – IT World Canada – Cyber Security Today, Week in Review for Friday, September 2, 2022
- 9/2/2022 – IT Online – Digital Forensics, incident response offer varied career options
- 9/2/2022 – Oswego County Today – Oswego Health Leadership Changes: 2023 Incoming President, CEO Michael Backus Appoints His Corporate Leadership Team
- 8/31/2022 – TechTarget - Remote work cybersecurity: 12 risks and how to prevent them
- 8/30/2022 – AOL (Newsy Syndication) - Changing Your Password Often Might Be Hurting Your Privacy
- 8/30/2022 – Tanium Blog - How to Quickly Scale Up a Security Operations Center
- 8/29/2022 – Tech Native - What keeps CISOs up at night – and how they can get their full 8 hours
- 8/28/2022 – The Life of Hendriksen 982 - LLamasoft Continues to Grow
- 8/28/2022 – Techkrest - Some Google Play Store Apps Still Present Dangerous Shape-Shifting Threats
- 8/28/2022 – Help Net Security - Week in review: RCE bug in GitLab patched, phishing PyPI users, Escanor malware in MS Office docs
- 8/26/2022 – Develop.Secure.Software – 5 Reasons to Stop Blaming Developers for Software Security Fails
- 8/26/2022 – IT World Canada - Cyber Security Today, Week in Review for Friday, August 26, 2022
- 8/26/2022 – Tenable Blog – Cybersecurity Snapshot: 6 Things that Matter Right Now
- 8/26/2022 – Minneapolis/ St. Paul Business Journal – Table of Experts: Cybersecurity
- 8/25/2022 – CSO Online – How Can CISOs Tackle the SOC Talent Shortage?
- 8/25/2022 – The CyberWire (Daily Newsletter) - Oktapus campaign. Exotic Lily's Bumblebee Loader. DNS traffic insights. DHS shutters disinfo board. Hybrid war at six months.
- 8/24/2022 – GovTech - Could a New Pathways Program Ease Cyber Talent Troubles?
- 8/24/2022 – HR Tech Series – SANS Institute Partners With Mission43 To Bring Free Cybersecurity Training And Certification To Idaho Veterans
- 8/24/2022 – IT World Canada – Cyber Security Today, August 24, 202022 – Watch your cyber insurance coverage, threat actors abusing SaaS platforms and more
- 8/24/2022 – Business World – Protecting the Crown Jewels from Cyberattack
- 8/23/2022 – Help Net Security – What businesses can do to anticipate and mitigate ransomware threats
- 8/23/2022 – Lifewire – A Song Can Crash Your Hard Drive? It Happens More Than You Think
- 8/23/2022 – TechBeacon – Securing IT Infrastructure Against Complexity
- 8/23/2022 – Security Management – Fostering the Geniuses in Your Backyard Through DE&I Efforts
- 8/23/2022 – The CyberWire (Daily Newsletter) - Zimbra exploitation. PAN-OS bug. New Iranian APT tool out. DDoS at LockBit. Twitter whistleblower. Notes on a hybrid war.
- 8/22/2022 – CSO Magazine: 7 Critical Steps for Successful Security Onboarding
- 8/22/2022 – Rose Covered Glasses: DHS Marks Expansion of Bug Bounty Efforts With Impending Contract Awards
- 8/22/2022 – The CyberWire (Daily Newsletter) - Data-tampering attacks. Bogus DDoS protection drive-bys. Estonia deals with DDoS attacks. Roskomnadzor's Internet panopticon.
- 8/22/2022 – SC Magazine: Security Executive of the Year | Dragos CEO Robert M Lee
- 8/21/2022 – This Week in 4n6: Week 34
- 8/19/2022 – The CyberWire (Daily Newsletter) - Cozy Bear update. Gang targets travel, hospitality. CISA bulletins. Killnet DDoS campaign hits Estonia. UK, US cyber ops.
- 08/18/2022 - EyeSpy - Veterans Explain How Military Service Prepared Them for Cybersecurity Careers
- 08/18/2022 - Tech Bullion - How to Start a Career in Cybersecurity?
- 08/18/2022 - HackRead - How to Become a Cybersecurity Expert
- 08/16/2022 - Security Boulevard - Is Your Supply Chain Safe?
- 08/16/2022 - ReadWrite - 8 Ways to Improve Your Customer Service Security
- 08/15/2022 - IT News - Realtek SDK exposes systems to SIP bug
- 08/14/2022 - Security Boulevard - Modern SaaS Risks – CISOs share their SaaS security checklist
- 08/12/2022 - Federal News Network - DHS marks expansion of bug bounty efforts with impending contract awards
- 08/12/2022 - Medium - Part 3: Privacy Preserving Machine Learning: Encryption for the Rest of Us — Data for the Best of Us
- 08/9/2022 - Scholars Globe - Top 3 Ethical Hacking Certifications You Can Take To Boost Your Career in 2022
- 08/9/2022 - Executive Secretary - Lowering the Barrier to Entry in the Cybersecurity Field With Ron Gula of Gula Tech Adventures
- 08/8/2022 - Tech Target - Top 8 in-demand cybersecurity jobs for 2022 and beyond
- 08/7/2022 - SatireGaming - Security Awareness Computer-Based Training Market Growth (Status and Outlook) 2022-2028: KnowBe4, Cofense (PhishMe), InfoSec Institute, Proofpoint, SANS Institute
- 08/5/2022 - Sonic Wall - Top curated cybersecurity news and trends from leading news outlets and bloggers in the IT security industry.
- 08/5/2022 - SOC Prime - Threat Hunting Training, Certification, and Online Learning
- 08/4/2022 - TheRecord.Media - Taiwan Defense Ministry says DDoS incident briefly took down network after Pelosi visit
- 08/3/2022 - KnowledgeHut - Best Operating System (OS) for Ethical Hacking
- 08/3/2022 - GovLoop - CIS CYBERMARKET BRINGS BEST-IN-BREED TOOLS TO STATE, LOCAL AGENCIES
- 08/3/2022 - Washington Post - Those Pelosi-inspired cyberattacks in Taiwan probably weren't all they were cracked up to be
- 08/2/2022 - Attack Feed - Taiwanese government sites hit with DDoS attacks ahead of Pelosi’s visit AJ Vicens
- 08/2/2022 - Cyber Scoop - Taiwanese government sites hit with DDoS attacks ahead of Pelosi's visit
- 08/3/2022 - Medium - Is OSINT legal or ethical?
- 08/1/2022 - Dark Reading - Chromium Browsers Allow Data Exfiltration via Bookmark Syncing
- 08/1/2022 - IT World Canada - Cyber Security Today, August 1, 2022 – Alberta gets new a privacy commissioner, Apple traffic briefly runs through Russia and more
- 07/29/2022 - IMECAMUSIC - What Women Should Know Before Joining the Cybersecurity Industry
- 07/21/2022 - Media Sonar - 20 Security Experts to Follow in 2022
- 07/21/2022 - Student Circuit - The UK tech talent shortage
- 07/18/2022 - Cloud Defense - Despite years of preparation, Ukraine’s electric grid still an easy target for Russian hackers
- 07/18/2022 - Healthcarereimagined.net - White House to hold summit on addressing the thousands of unfilled cybersecurity jobs
- 07/15/2022 - VMWare - Multicloud Briefing July 2022
- 07/15/2022 - Dice - Python Certifications: Do They Exist? Are They Worth Earning?
- 07/15/2022 - Dice - Cybersecurity Analyst: Average Salary, Top Locations, and More
- 07/08/2022 - ZD Net - The 7 best cybersecurity certifications: Become a security expert
- 07/08/2022 - IT Pro - The new wave of cyber security threats facing critical national infrastructure (CNI)
- 07/07/2022 - Tech Target - How to create a critical infrastructure incident response plan
- 07/07/2022 - Professional Security Magazine Online - NCSC advice on cyber burnout
- 07/07/2022 - Technology Magazine - Cyber experts SANS Institute praise Apple's Lockdown Mode
- 07/07/2022 - DICE- Red Team vs. Blue Team: How They Impact Your Cybersecurity Career
- 07/07/2022 - Boomers Hub - Key ways to prevent phishing and vishing scams for seniors
- 07/07/2022 - Energy Wire - Energy enters a perilous era of supply chain risks
- 07/06/2022 - Bright - Security is Everybody’s Job — Part 2 — What is Application Security?
- 07/06/2022 - SC Magazine (UK) - Here’s why CISOs can’t sleep at night…
- 07/06/2022 - AvenueNorth8 - Do Employers Value Cybersecurity Certifications?
- 07/05/2022 - Career Karma - Cyber Security Certifications: Highest-Paying Certification, Exam Preparation, and Job Outlook
- 07/05/2022 - Rural Tech Fund - Meet Our 2022 Scholarship Recipients
- 06/29/2022 - Insider NJ - New Jersey Students Claim Top Spots in National Cyber Competition
- 06/29/2022 - CloudDefense.com - Cyber Security Today for June 29, 2022 — A list of the most dangerous software weaknesses is updated, a warning to Kubernetes administrators, and more
- 06/29/2022 - Varonis - What is a Security Policy? Definition, Elements, and Examples
- 06/27/2022 - DICE- Cybersecurity Certifications: Do You Need Them to Land a Job?
- 06/27/2022 - Georgia Tech Boot Camps - The Complete Cybersecurity Career Guide for Veterans
- 06/24/2022 - ZDNET - The 7 best cybersecurity certifications: Become a security expert
- 06/24/2022 - GovLoop - CIS CYBERMARKET BRINGS BEST-IN-BREED TOOLS TO STATE, LOCAL AGENCIES
- 06/24/2022 - The Strait Times - Cyber-security professionals have to keep upgrading skills against new online threats
- 06/24/2022 - TechTarget - How to fit customer experience security into your strategy
- 06/23/2022 - The Register (UK) - NSO claims 'more than 5' EU states use Pegasus spyware
- 06/22/2022 - IT Brew - IT pros: Register multiple "second factors"
- 06/22/2022 - IT World Canada - Cyber Security Today for June 22, 2022 – A possible lesson from a bank’s second data breach, and more
- 06/21/2022 - CloudDefense - Allectum announces Australia’s first Veteran Cyber Academy graduation
- 06/21/2022 - eSecurity Planet - 15 Top Cybersecurity Certifications for 2022
- 06/21/2022 - Forensic Focus - A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems
- 06/21/2022 - Digital Journal - Security Awareness Computer-Based Training Market Size 2022
- 06/20/2022 - NewsAxes - Final Information: Making a Cyber Safety Incident Response Plan | UpGuard
- 06/20/2022 - News of Bahrain (ME) - Tamkeen-Beyon Cyber deal to train, hire Bahraini Cybersecurity Specialists
- 06/20/2022 - Channel 969 - Microsoft Patches ‘Follina’ Zero-Day Flaw in Month-to-month Safety Replace
- 06/19/2022 - Channel 969 - Veterans Clarify How Navy Service Ready Them for Cybersecurity Careers
- 06/18/2022 - DVIDS - Alaska National Guard Participates in Cyber Shield 2022, the DoD’s Largest Unclassified Cyber Defense Exercise
- 06/17/2022 - InkBot Design - 10 Cybersecurity Best Practices Every Web Developer Should Know
- 06/17/2022 - EndPoint - Why Multicloud Security Never Sleeps
- 06/17/2022 - On Page - Choosing the Right Incident Notification Tool for Your Incident Response Plan
- 06/16/2022 - National Governors Association - Re-Envisioning State Cyber Response Capabilities: The Role Of Volunteers In Strengthening Our Systems
- 06/16/2022 - Health IT Security - Operational Technology (OT) Security Risks, Best Practices in Healthcare
- 06/15/2022 - Dark Reading- Veterans Explain How Military Service Prepared Them for Cybersecurity Careers
- 06/15/2022 - Security Boulevard - Build Your Career in Cybersecurity: Essential Jobs and Salary in 2022
- 06/15/2022 - IT Pro - The rise of phishing as a service (PhaaS) and how to tackle it
- 06/14/2022 - Help Net Security - Saas security: How to avoid “death by 1000 apps
- 06/14/2022 - Analytics Blog - Network Security Certifications to Combat Growing Data Breach Threats
- 06/14/2022 - Task and Purpose - Why this ‘large man in a ghillie suit’ is the hero the military needs right now
- 06/13/2022 - National Cyber Security News Today - Massachusetts National Guard Plays Key Role in Cyber Shield 2022, the DoD’s Largest Unclassified Cyber Defense Exercise
- 06/13/2022 - Dark Reading - Microsoft Patches 'Follina' Zero-Day Flaw in Monthly Security Update
- 06/10/2022 - Biz Tech Magazine - Everything Old Is New Again for Hackers
- 06/02/2022 - IT Web - SA women invited to apply for cyber security scholarship
- 06/01/2022 - Channel Life - Taking a data-driven approach to SOC operations
- 06/01/2022 - IT News Africa - R110,000 Cybersecurity Scholarship Launched for Women of Colour in South Africa
- 06/01/2022 - Cybersecurity Dive - Microsoft zero-day under attack as industry awaits patch
- 06/01/2022 - Security Week - Chinese Threat Actors Exploiting 'Follina' Vulnerability
- 06/01/2022 - Hackread - Unofficial Micropatch for Follina Released as Chinese Hackers Exploit the 0-day
- 06/01/2022 - ReadMe - ‘Pull the fire alarm.’ Cybercriminals rush to exploit Microsoft zero-day
- 05/31/2022 - California18 - Zero-day vulnerability in MS Office: Microsoft makes recommendations
- 05/31/2022 - Information Security Buzz - Microsoft Vulnerability Named Follina
- 05/31/2022 - Dark Reading - New Microsoft Zero-Day Attack Underway
- 05/31/2022 - CSO Online - 2022 CSO Hall of Fame honorees
- 05/31/2022 - ORAM Corporate Advisors - ORAM’s Complete Guide to Password and Passphrase Security in 2022
- 05/31/2022 - Federal News Network - Medical devices are the soft cybersecurity underbelly for health care providers
- 05/31/2022 - Bleeping Computer - Aligning Your Password Policy enforcement with NIST Guidelines
- 05/29/2022 - Industrial Cyber - ICS cybersecurity training can help fight off adversarial attacks in evolving threat landscape
05/28/2022 -Insurance Business (AUS) - Why insurance CEOs should be technology geeks
- 05/24/2022 - SecurityWeek - PyPI Served Malicious Version of Popular 'Ctx' Python Package
- 05/24/2022 - TechTarget - Developers targeted by poisoned Python library
- 05/24/2022 - TechRegister (UK) - Developers targeted by poisoned Python library
- 05/24/2022 - The Hacker News - Popular PyPI Package 'ctx' and PHP Library 'phpass' Hijacked to Steal AWS Keys
- 05/24/2022 - SecurityWeek - PyPI Served Malicious Version of Popular 'Ctx' Python Package
- 05/23/2022 - Neotel Segurança Digital (BR) - What is Port Scanning?
- 05/21/2022 - Insurance Business (AU) - Insurers - here's an alternative to partnering with an insurtech
- 05/20/2022 - cyberwire - Notes from the cyber phases of a hybrid war
- 05/20/2022 - Professional Security (UK) - Cyber and the Law
- 05/20/2022 - The Wall Street Journal - Third-Party Cyber Risk Management Primer
- 05/19/2022 - CIO Korea (APAC) - 12 steps to building a top-notch vulnerability management program
- 05/18/2022 - Beta News -Unlocking the hidden resources that could solve the cyber skills crisis [Q&A]
- 05/18/2022 - Gulf Insider Bahrain (MENA) :- Tamkeen partners with SANS Institute to provide cybersecurity training
- 05/17/2022 - TradeArabia (MENA) - Tamkeen in deal to provide cyber security training to Bahrainis
- 05/16/2022 - CSO online - 12 steps to building a top-notch vulnerability management program
- 05/14/2022 - cyberwire - Costa Rica declares state of emergency as Conti ransomware cripples government sites
- 05/13/2022 - BestStartup - Meet California's 101 Top Founders in the Education Space
- 05/13/2022 - University Business - How higher ed can pave the way for the future of the cybersecurity workforce
- 05/13/2022 - Heise- Security (DE) - Patch now! F5 BIG-IP systems are under active attack
- 05/12/2022 - ASDAF News (MENA) - Keeping An Eye On Cyber Threats: SANS to Host Immersive Skills Training Program in Qatar
- 05/12/2022 - Computing (UK) - Threat actors exploit F5 BIG-IP vulnerability to wipe devices
- 05/11/2022 - TechTarget - Critical F5 vulnerability under exploitation in the wild
- 05/11/2022 - The Hacker News - CISA Urges Organizations to Patch Actively Exploited F5 BIG-IP Vulnerability
- 05/11/2022 - Bleeping Computer - CISA tells federal agencies to fix actively exploited F5 BIG-IP bug
- 05/11/2022 - cyberwire - A new RAT, and a curious new style of exploit. Advisories from CISA and its partners
- 05/11/2022 - Tech Radar - Major F5 exploit has been used to attack and wipe devices
- 05/11/2022 - Security Week - Critical Vulnerability Exploited to 'Destroy' BIG-IP Appliances
- 05/11/2022 - IFSEC Global (UK) - The history and development of converged security
- 05/10/2022 - Krebs on Security - Microsoft Patch Tuesday, May 2022 Edition
- 05/10/2022 - Ed Tech - Universities Share Lessons Learned from Ransomware Attacks
- 05/10/2022 - Bleeping Computer - Critical F5 BIG-IP vulnerability exploited to wipe devices
- 05/09/2022 - Dark Reading - How to Check If Your F5 BIG-IP Device Is Vulnerable
- 05/09/2022 - Decipher - Exploits Emerge for Critical F5 Flaw
- 05/09/2022 - HelpNetSecurity - Attackers are attempting to exploit critical F5 BIG-IP RCE
- 05/09/2022 - Security Week - F5 BIG-IP in Attacker Crosshairs Following Disclosure of Critical Vulnerability
- 05/09/2022 - Professional Security Magazine (UK) - App threat report
- 05/07/2022 - Security Boulevard - Your Phone May Soon Replace Many of Your Passwords
- 05/07/2022 - Krebs on Security - Your Phone May Soon Replace Many of Your Passwords
- 05/07/2022 - Bollyinside (India) - Many of your passwords may soon be replaced by your phone
- 05/06/2022 - GovInfoSecurity - SANS Institute - Industrial Control System Resilience
- 05/05/2022 - Computable (BE) - Celebrate May 5... with World Password Day
- 05/04/2022 - Cybersecurity: Amplified and Intensified - Cybersecurity Reskilling with Max Shuftan, SANS Institute
- 05/04/2022 - Tech Business News - World Password Day 2022 Reminds the Importance of Digital Hygiene
- 05/04/2022 - ExtraHop - SANS SOC Survey Trends Over the Past Four Years
- 05/04/2022 - BScholarly - Best free Websites to Learn Hacking 2022: Top 10
- 05/03/2022 - Infopoint Security (DE) - SANS Summits: Cloud Security, Neurodiversität und ICS Security
- 05/02/2022 - Toolbox - Looking to Boost Your Password Security Strategy? Top InfoSec Conferences You Shouldn’t Miss
- 05/02/2022 - Defence Connect (AU)- Allectum, SME Gateway win RAAF contract to deliver sustainment office capability for the Distributed Ground Station
- 04/30/2022 - Hardware Info (NL) - SANS report: ransomware just got faster and better
- 04/29/2022- Security Brief (AU) - The increasing importance of cyber threat intelligence
- 04/27/2002 - UK Tech News (UK) - Retailer 'The Works' targeted by cyberattacks, causing some store closures
- 04/26/2022 - Envision RISE - Diversifying the Tech & Cybersecurity Workforce with Women of Color through Education and Training
- 04/25/2002 - Indeed - How To Get an Online Master's Degree in Information Security in 6 Steps
- 04/25/2002 - SmartFutures (UK) - Mind the OT cyber perception gap
- 04/21/2022 - Industrial Cybersecurity Pulse - Cybersecurity tactics to defend your workforce
- 04/20/2022 - ZDNet - The 6 best ethical hacking certifications: Hone your skills
- 04/20/2022 - ZDNet - The 7 best cybersecurity certifications: Become a security expert
- 04/20/2022 - Telecom News (UK) - Expert urges everyday users to be cautious as Downing Street and Foreign Office Mobile Devices Targeted in High Profile Cyber Attack
- 04/20/2022 - UK Tech News (UK) - Expert urges everyday users to be cautious as Downing Street and Foreign Office Mobile Devices Targeted in High Profile Cyber Attack
- 04/19/2022 - Channel Futures (UK) - UK Government Falls Victim to Pegasus Spyware Attacks
- 04/19/2022 - Associations Now - Five Ways to Make Your Digital Documents More Secure
- 04/19/2022 - FederPrivacy (IT) - Information security: the control and risk requirements frameworks of the ISO 27001: 2013 standard
- 04/19/2022 -cyberwire - The Next Evolution of Security Awareness
- 04/19/2022 - MarTech Series - ZeroFox Expands Threat Intelligence Capabilities with Exclusive Visibility into External Threats
- 04/15/2022 - HelpNetSecurity - Critical Microsoft RPC runtime bug: No PoC exploit yet, but patch ASAP! (CVE-2022-26809)
- 04/15/2022 - The New Stack - First Malware Running on AWS Lambda Discovered
- 04/14/022 - Security Boulevard - Filling The Cybersecurity Skills Gap
- 04/13/2022 - The Hacker MInd - Ep 44: Hackers Wanted: Filling The Cybersecurity Skills Gap
- 04/12/2022 - Dice Insights - Threat Hunting Skills Can Boost Your Cybersecurity Career
- 04/12/2022 - CyberWire - Johannes Ullrich from SANS on malicious ISO files embedded in HTML
- 04/12/2022 - CanalTech (BR) - Campanha de spam distribui praga que rouba senhas a usuários corporativos
- 04/12/2022 - Bleeping Computer - New Meta information stealer distributed in malspam campaign
- 04/11/2022 - HelpNetSecurity - The benefits of cyber risk quantification in the modern cybersecurity landscape
- 04/11/2022 - New-Tech Online (IL) - How to get on track to create innovative digital experiences
- 04/08/2022 - IT World Canada - Cyber Security today, Week in Review for Friday, April 8, 2022
- 04/07/2022 - Dark Reading - Mandiant to Use CrowdStrike Technology in Its Incident Response Services
- 04/07/2022 - Government Technology - Governor Proclaims April ‘STEM Month’ in North Carolina
- 04/07/2022 - IDG Connect - Secret CSO - GIAC
- 04/06/2022 - Khaleej Times (UAE) - SANS bridges current cybersecurity skills gap in region
- 04/06/2022- Flatland, Kansas City - Inside Story: Kansas, Cyber Spies, Nuclear Power and the Ukraine War
- 04/06/2022 - HealthITSecurity - Software Vulnerabilities Point to Need for ICS Security in Healthcare
- 04/04/2022 - E&E News EnergyWire - War, fear, ‘hacktivist’ zeal are upending energy cybersecurity
- 04/04/2022 - IT World Canada - Cyber Security Today, April 4, 2022 – British teens face Lapsus$-related criminal charges, an MFA warning and updates needed for Github, Rockwell PLCs and Apple devices
- 04/04/2022 - SecurityWeek - Vendors Assessing Impact of Spring4Shell Vulnerability
- 04/04/2022 - CDO Trends (APAC) - The Security Analyst: An Expert In A Beginner’s Clothing
- 04/02/2022 - Analytics Insight - Top 10 Ethical Hacking Certifications to Become a Security Expert
- 04/01/2022 - VentureBeat - Cyber Hollywood: Onscreen vs. Reality
- 04/01/2022 - iTNews (AU) - SANS spots Spring4shell vulnerability exploitation attempts
- 03/31/2022 - Philadelphia Inquirer - Hackers’ path eased as 600,000 U.S. cybersecurity jobs sit empty
- 03/30/2022 - Bloomberg - Hackers’ Path Eased as 600,000 U.S. Cybersecurity Jobs Sit Empty
- 03/30/2022 - Government Technology - Fears Mount Over 600,000 Unfilled Cybersecurity Jobs
- 03/30/2022 - Tech Times - US Cybersecurity Needs to Fill 600,000 Positions as Country Prepares for Possible Cyberattack From Russia
- 03/30/2022 - TechTarget - Top DevSecOps certifications and trainings
- 03/30/2022 - HelpNetSecurity - How to recruit cybersecurity talent from atypical backgrounds
- 03/30/2022 - Employee Benefit News - HBCUs are working to drive more diverse talent to cybersecurity
- 03/30/2022 - The Blockchain Show - Can Blockchains be hacked?
- 03/30/2022 - Engineering & Technology (UK) - Nearly 40 per cent of UK businesses hit by cyber attacks
- 03/23/2022 - The Washington Post - Experts are split on whether it's okay for Ukrainians to hack Russia
- 03/23/2022 - Le Monde Informatique (FR) - 6 tactiques des cybercriminels pour cacher leurs traces
- 03/22/2022 - CXO Insight (MENA) - SANS Institute At GISEC 2022
- 03/22/2022 - Private Banker International (UK) - Covid-19 created a cybersecurity boom: The Ukraine crisis will see it grow
- 03/22/2022 - Professional Security Magazine (UK) - Biden on cyber ‘critical moment’
- 03/21/2022 - FutureEd (UK) - How schools can ease the cybersecurity talent shortage
- 03/21/2022 - Business Daily Media (UK) - Why businesses should invest more in their people and not cybersecurity technology
- 03/21/2022 - Dark Reading - Will the Biggest Clouds Win? Lessons From Google's Mandiant Buy
- 03/21/2022 - Gulf News (MENA) - SANS Institute to spotlight interactive cybersecurity training and workforce development at GISEC 2022
- 03/20/2022 - CISOLife - Delisha Hodo Interview - SANS Institute HBCU Chair & Senior Student Advisor
- 03/19/2022 - Forbes Brazil (BR) - Compra da Mandiant pelo Google mostra importância da cibersegurança
- 03/18/2022 - The Cyberwire - Hacktivism and other cyberattacks continue against Russian targets, but some hacktivism may go too far. C2C market notes. Advice from CISA and NIST. Prank calls as statecraft
- 03/15/2022 - IT Business Edge - Top 10 Cybersecurity Jobs for 2022
- 03/14/2022 - CSO Online - 8 keys to more effective vulnerability management
- 03/11/2022 - Control Engineering - Cybersecurity: Introduction to ICS security fundamentals
- 03/10/2022 - Enterprise Networking Planet - Best Digital & Computer Forensics Tools 2022
- 03/09/2022 - CSO Online - Responding to heightened cyberattack risk: Focus on the basics
- 03/08/2022 - Forbes - Google’s $5.4 Billion Acquisition Of Cybersecurity Firm Mandiant Comes As Tech Leaders Brace For Escalating Digital Threats
- 03/07/2022 - Dark Reading - Industrial Systems See More Vulnerabilities, Greater Threat
- 03/07/2022 - AARP - The Best Ways to Use Digital Money Tools
- 03/07/2022 - Lawfare - What to Make of Microsoft’s Year in Cybersecurity
- 03/07/2022 - The Naked Scientist - Cyber in context
- 03/07/2022 - Medium - Certification in Cybersecurity!
- 03/07/2022 - RTO Insider - Cyberattacks More Likely as Russo-Ukrainian War Continues - Experts Warn Military Stalemate Could Escalate Risk
- 03/06/2022 - TechTarget - Top DevSecOps certifications and trainings
- 03/04/2022 - Dark Reading - After a Busy December, Attacks on Log4j Vulnerability Dropped
- 03/04/2022 - IT World Canada - Six quick tactics to blunt a cyber attack from Russia – or any nation state
- 03/04/2022 - Industrial Cybersecurity Pulse - Consequence-driven ICS risk management
- 03/03/2022 - The Wall Street Journal - Freight Operator Expeditors Still Working to Recover From Cyberattack
- 03/03/2022 - Dark Reading - Cybersecurity Mesh Architecture: Hope or Hype?
- 03/03/2022 - Enterprise Sec Tech - Johannes Ullrich, SANS: Recognizing Fake Social Media Posts During Russia-Ukraine Conflict
- 03/03/2022 - Wired - Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine
- 03/03/2022 - HelpNetSecurity - The biggest threat to ICS/OT is a lack of prioritization
- 03/02/2022 - World Pipelines - New research reveals cyber attackers are actively targeting OT/ICS environments
- 03/02/2022 - IT World Canada - Cyber Security Today, March 2, 2022 — Toyota and Aon deal with cyber attacks, updates on Axis and Nvidia attacks, and more
- 03/01/2022 - Journal of Petroleum Technology - Research Finds Cyberattackers Actively Target Industrial Operations
- 03/01/2022 - Cyberdegrees.org - Professional Spotlight: Anthony Messina GSEC, GCIH, GPEN
- 02/28/2022 - Forbes - Federal Agencies Have New Cybersecurity Requirements — The Private Sector Can Learn From Them, Too
- 02/25/2022 - The Wall Street Journal - Amid Warnings of Cyberattacks in Ukraine, U.S. Companies ‘Sitting and Waiting’
- 02/25/2022 - eSecurity Planet - SANS Outlines Critical Infrastructure Security Steps as Russia, U.S. Trade Cyberthreats
- 02/25/2022 - Dark Reading - 7 Steps to Take Right Now to Prepare for Cyberattacks by Russia
- 02/25/2022 - The Record by Recorded Future - Most attackers lose interest in Log4Shell
- 02/25/2022 - Industrial Cybersecurity Pulse - Benefits of developing a security awareness program
- 02/24/2022 - The Seattle Times - WA companies prepare as threat of Russian cyberattacks increases
- 02/24/2022 - Government Technology - Cyber Attacks Are Dangerous Russian Weapon Against Ukraine
- 02/23/2022 - The Los Angeles Times - Russia’s other dangerous weapon against Ukraine? Cyberattacks
- 02/23/2022 - The Stack - As Russia strikes, CISOs, security pros are fielding a lot of calls…
- 02/23/2022 - Security Boulevard - Developers Need Security Training
- 02/22/2022 - The Wall Street Journal - Expeditors International Shuts Down Computer Systems After Cyberattack
- 02/19/2022 - Politico - Despite years of preparation, Ukraine’s electric grid still an easy target for Russian hackers
- 02/18/2022 - Industrial Cybersecurity Pulse - Three ways to engage your workforce in 2022
- 02/17/2022 - Security Boulevard - SANS Institute: Preparing for Cyberattacks
- 02/17/2022 - HBCU Buzz - SANS Institute Offers Two HBCU Opportunities To Learn And Win Big
- 02/17/2022 - CyberWire - Daily Podcast Episode 1518 | 2.17.22
- 02/16/2022 - EnterpriseSecurityTech - SANS Institute Launches First-Ever Nationwide Cybersecurity Education Scholarship for HBCU Students
- 02/16/2022 - Security Boulevard - SANS Cyber Defense – PowerShell 2022: State of the Art / Hack / Infection
- 02/16/2022 - Dark Reading - Where AI Falls Down in Cybersecurity
- 02/16/2022 - Alpha Efficiency - Web Development Certifications That Will Boost Your Reputation - GIAC
- 02/15/2022 - The Washington Post - Russian government hackers have likely penetrated critical Ukrainian computer systems, U.S. says
- 02/15/2022 - Dark Reading - Securonix Secures Over $1B in Growth Investment From Vista Equity
- 02/11/2022 - Help Net Security - Apple fixes actively exploited iOS, macOS zero-day (CVE-2022-22620)
- 02/10/2022 - Campus Technology - SANS Institute Launches Cybersecurity Scholarships for HBCU Students
- 02/10/2022 - InfoSecurity Magazine - SANS Institute Launches Nationwide Scholarship Program
- 02/08/2022 - Security Boulevard - Growth of Digital Commerce Fuels 1.5x Increase in Online Fraud in 2021
- 02/07/2022 - Medium - Where to get Cybersecurity Training and Career Development?
- 02/07/2022 - IT World Canada - Cyber Security Today, Feb. 7, 2022 – Insight into a ransomware gang, email used in cyberattacks on Ukraine, and more
- 02/07/2022 - The Wall Street Journal - Cyber Daily: Ukraine Considers Offers for Cyber Help
- 02/05/2022 - TechRepublic - Cybersecurity incident response: The 6 steps to success
- 02/04/2022 - The Washington Post - Senators aren't swayed by Apple's security arguments
- 02/04/2022 - Security Management - Beijing 2022 Winter Olympics Open, Amidst Boycotts and Cyber and Privacy Concerns
- 02/03/2022 - Working Nation - Opening the diversity pathway into the cybersecurity industry
- 02/02/2022 - CSO Online - Packet Data Adds Increasing Value to Next-Gen Cybersecurity: SANS Institute report highlights growing trend
- 01/31/2022 - Federal News Network - Congress wants to overhaul FISMA. Agencies are already starting to measure security differently
- 01/31/2022 - Datamation - 10 Top Cybersecurity Certifications
- 01/31/2022 - SC Magazine - Wanted: mobile app pen testers
- 01/28/2022 - HealthITSecurity - DHS Warns of Potential Russian Cyberattacks on Critical Infrastructure
- 01/26/2022 - Dark Reading - Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit
- 01/26/2022 - CyberDefense - Cybersecurity Experts Share Their Predictions for 2022
- 01/20/2022 - The Washington Post - Is Russia or China the biggest cyber threat? Experts are split
- 01/19/2022 - The State of Security - Tips for Defending Against Adversarial Actions Regardless of Their Origin
- 01/17/2022 - Security Intelligence - What It Takes to Build the Blue Team of Tomorrow
- 01/14/2022 - Associated Press - Cyberattack in Ukraine targets government websites
- 01/14/2022 - USA Today - U.S. assessing cyberattack against government websites in Ukraine
- 01/14/2022 - MarketWatch - Ukraine assessing damage after government websites are taken offline amid cyberattack
- 01/14/2022 - ThreatPost - ‘Be Afraid:’ Massive Cyberattack Downs Ukrainian Gov’t Sites
- 01/14/2022 - IT World Canada - Firms using open source have duty to act fast when bugs are found: Apache
- 01/14/2022 - Security Magazine - Top 28 cybersecurity conferences of 2022
- 01/12/2022 - Dark Reading - Check If You Have to Worry About the Latest HTTP Protocol Stack Flaw
- 01/12/2022 - HealthITSecurity - Critical, “Wormable” Microsoft Vulnerability Could Lead to Cyberattacks
- 01/12/2022 - CIO Magazine - 7 ways to breathe new life into your IT leadership career
- 01/12/2022 - The Daily Swig - Patch Tuesday: Web security issues in the spotlight in Microsoft’s bumper January update
- 01/11/2022 - esecurityplanet - Cybersecurity Employment in 2022: Solving the Skills Gap
- 01/11/2022 - HealthITSecurity - Adopting Defense In Depth Strategies to Combat Healthcare Cyberattacks
- 01/11/2022 - Security Boulevard - To Scale Your Brand Protection Think AI and Automation
- 01/08/2022 - CIO Review - 7 Tips and Tools to Protect University Campuses from Cyber Attacks
- 01/07/2022 - Make Use Of - 3 Ways to Encourage People to Pursue a Career in Cybersecurity
- 01/05/2022 - Security Boulevard - Brand Protection Takes Priority for InfoSec Teams in 2022
- 01/04/2022 - Future of Business and Tech - 3 Tips for Better Cybersecurity in Your Home Office
- 01/04/2022 - CyberWire Podcast - Log4j issues persist
- 01/03/2022 - CSO Online - 6 ways hackers hide their tracks
- 01/02/2022 - Augusta Free Press - Virginia participating in CyberStart America competition
12/23/2021 - CPO Magazine - Preventing Wire Fraud Can Be Easy, Navigating Liability Is Much More Complicated
12/22/2021 - Washington Post - Amazon Web Services’ third outage in a month exposes a weak point in the Internet’s backbone
12/22/2021 - Security Magazine - SANS holiday hack challenge adds in log4j bonus challenge
12/21/2021 - Channel Insider - Best Incident Response Tools for MSPs and MSSPs in 2022
12/20/2021 - CSO Online - 8 top penetration testing certifications employers value
12/20/2021 - InfoSecurity Magazine - Ukrainian War Games Test Electricity Grid
12/17/2021 - The Daily Swig - Ukraine hosts large-scale simulation of cyber-attack against energy grid
12/16/2021 - SC Magazine - Industrial cybersecurity requires unique skills. A new apprenticeship program aims to hone them
12/16/2021 - Cybersecurity Dive - Security teams prepare for the years-long threat Log4j poses
12/15/2021 - HelpNetSecurity - Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations
12/15/2021 - Industrial Cyber - Siemens Energy, SANS Institute, others align on industrial cybersecurity education
12/15/2021 -TechTarget - 'Insane' spread of Log4j exploits won't abate anytime soon
12/15/2021 - IT World Canada - Cyber Security Today, Dec 15, 2021: The hunt for Log4Shell bug continues
12/15/2021 - TechBeacon - How a modern SOC can make your threat hunting smarter
12/14/2021 - Medium - Incident Response (IR) & It’s Lifecycle
12/14/2021 - Tom's Guide - Massive Log4Shell internet security flaw threatens everyone — what you can do
12/14/2021 - ZD Net - US warns Log4j flaw puts hundreds of millions of devices at risk
12/14/2021 - Health IT Security - Severe Apache Log4j Vulnerabilities Could Result in Healthcare Cyberattack
12/14/2021 - Security Boulevard - CVE-2021-44228 Log4Shell Detection
12/14/2021 - Krebs on Security - Microsoft Patch Tuesday, December 2021 Edition
12/13/2021 - Decipher - Critical Log4j Flaw Fallout Continues
12/13/2021 -InfoSecurity Magazine - SANS Opens Free Holiday Hack Challenge
12/13/2021 - MyStartUpWorld - SANS Holiday Hack Challenge now open
12/13/2021 - AccessCyber - The Holidays are for Hacking
12/13/2021 - TechTarget - Why you need an email security policy and how to build one
12/13/2021 - HelpNetSecurity - Log4Shell update: Attack surface, attacks in the wild, mitigation and remediation
12/13/2021 - Security Week - Companies Respond to Log4Shell Vulnerability as Attacks Rise
12/10/2021 - Dark Reading - What to Do While Waiting for the Log4J Updates
12/10/2021 - protocol - Researchers warn of a 'very, very scary' bug affecting major apps
12/10/2021 - VICE / Motherboard - A Simple Exploit is Exposing the Biggest Apps on the Internet
12/9/2021 - IT World Canada - Canadian firms lagging in zero trust, SASE architectures, survey suggests
12/8/2021 - VICE / Motherboard - AWS Is the Internet's Biggest Single Point of Failure
12/8/2021 - VentureBeat - AWS outage shines a light on hybrid cloud
12/8/2021 - Dice Insights - Cybersecurity Analyst Interview Questions: 4 Prep Considerations
12/6/2021 - HelpNetSecurity - RSA Conference announces initial keynote speakers to address security topics and issues for 2022
12/1/2021 - eSecurity Planet - Best Cybersecurity Awareness Training for Employees in 2022
11/29/2021 - The Washington Post - Alan Paller, early leader in cybersecurity awareness, dies at 76
11/26/2021 - CPO Magazine - Emotet Malware Returns by Leveraging Trickbot’s Infrastructure and Resumes Phishing Campaigns
11/25/2021 - San Marcos Corridor News - Texas encourages high school students to participate in CyberStart America talent search
11/24/2021 - CSO Online - Biometric Adoption is Driving a Passwordless Future
11/24/2021 - Host Review - 5 Cloud Security Resources That You Should Be Using
11/23/2021 - Forbes - How Tech Companies Can Help Solve The Cybersecurity Skills Shortage
11/23/2021 - Security Boulevard - How to Fix Cybersecurity Recruiting
11/22/2021 - Healthy Women - Is Your Health Insurance Provider Tracking You Online?
11/18/2021 – Washington Technology - Cybersecurity advocate Alan Paller dead at 76
11/18/2021 - The Hack Post - Debunking the Biggest Misconceptions About Purple Teaming: Ensure the Best Results
11/17/2021 - The Register - Lock up your Office macros: Emotet botnet back from the dead with Trickbot links
11/17/2021 - Bleeping Computer - Here are the new Emotet spam campaigns hitting mailboxes worldwide
11/15/2021 - Central Penn Parent - Top ways to secure your family’s smart home and digital devices this holiday season
11/15/2021 - The New York Times - Alan Paller, a Mover on Cybersecurity Threat, Is Dead at 76
11/12/2021 - The Washington Post - The Cybersecurity 202: A newsletter briefing on cybersecurity news and policy. Chat Room. (scroll down to end)
11/12/2021 -Dark Reading - In Appreciation: Alan Paller
11/12/2021 - Daily Swigger - Alan Paller: Infosec World Pays Homage After SANS Founder And Infosec Luminary Dies
11/12/2021 -The CyberWire - Business Briefing 11-12-21 (scroll down to Executive Moves)
11/11/2021 - Federal News Network - Obituary: Alan Paller
11/11/2021 - SC Magazine - Alan Paller, founder of the SANS Institute, passes away at 76
11/11/2021 - Homeland Security Today - Cybersecurity Industry Titan and SANS Institute Founder Alan Paller Dies at 76
11/10/2021 - Security Boulevard - Podcast | Securing Family Devices with SANS Institute
11/05/2021 - Security Magazine - Why cyber risk assessments should be a part of your business strategy
11/04/2021 - SC Magazine - Should companies subject employees to ransomware-specific security training?
11/03/2021 - Medium - Cloud Security — Best Practices for DevSec Ops.
11/01/2021 - TechBeacon - Rethink your DevSecOps: 4 key lessons for achieving security as code
11/01/2021 - Technology Decisions - Cyber Academy scholarship program for veterans
11/01/2021 - Electrical Contractor Magazine - Grid Security Conference Brought Experts Together to Share Strategies
10/29/2021 - CIO Magazine - How Can CISOs Tackle the SOC Talent Shortage?
10/27/2021 - NaijaTechGuide - Top 5 Best InfoSec and Cybersecurity Certifications to Uplift your Career
10/26/2021 - Enterprise Security Tech - The Hidden Cyber Threat: Secure Your Family's Smart Devices
10/26/2021 - Design World - Brewing up DIY automation solutions
10/25/2021 - DefenceConnect - Allectum, SANS Institute launch Veterans Cyber Academy Scholarship for 2022
10/22/2021 - Forbes - The Importance Of Measuring Security Awareness
10/22/2021 - Security Magazine - Ed Skoudis named President of SANS Technology Institute
10/21/2021 - IT World Canada - Don’t be tripped up by zero trust myths
10/21/2021 - Legal Talk Network - The SANS Institute and Cybersecurity Careers
10/21/2021 - Government Technology - USC Aiken and SANS Tech Start Cybersecurity Degree Program
10/20/2021 - SC Media - Duke Health officials on security awareness: ‘Harder to tune humans than … to tune a tool’
10/20/2021 - Aiken Standard - USC Aiken, SANS cyber experts join forces for new education opportunity
10/19/2021 - DataQuest - Cybersecurity Awareness Month: How enterprises should approach cybersecurity
10/18/2021 - IT World Canada - Ransomware payments may have totaled hundreds of millions in US, and more
10/15/2021 - Washington Post - U.S. pursues a unique solution to fight hackers. It revolves around esports.
10/15/2021 - Information Age - Ransomware threatens cyberinsurers
10/14/2021 - DarkReading - Digging Deep Into the Top Security Certifications
10/14/2021 - Tech Gaming Report - SANS publishes a report on smartphone stability
10/14/2021 - Nintendo Power - SANS publishes report on smartphone security
10/13/2021 - SearchSecurity: NotPetya ransomware trend moving towards sophistication
10/11/2021 - The Register - Gripped by cybersec career indecision? Don’t give up. Level up
10/11/2021 - CSO Online - 6 ways the pandemic has triggered long-term security changes
10/06/2021 - Latest Hacking News - Here’s What Caused Facebook’s Global Outage
10/06/2021 - Rapid7 - Five Functions That Benefit From Cybersecurity Automation
10/06/2021 - APN News: SANS Institute Introduces #Securethefamily Campaign To Help Protect Families Online
10/04/2021 - ZDNet: Cybersecurity budgets for industrial control systems and operational tech increasing: SANS Institute
10/04/2021 - IT World Canada: Facebook, Instagram, WhatsApp finally back online
10/04/2021 - Forbes: These Three Letter Tech Acronyms Are Likely Behind Today’s Mega Outage At Facebook
10/04/2021 - Channel Daily News: Facebook, Instagram, WhatsApp finally back online
10/04/2021 - Bleeping Computer: Facebook, WhatsApp, and Instagram down due to DNS outage
10/03/2021 - Washington Post: New emergency cyber regulations lay out ‘urgently needed’ rules for pipelines but draw mixed reviews
10/01/2021 - InTheBlack: Dark web boom: How to safeguard your corporate data
09/30/2021 - ComputerWorld: Edge Computing e cybersecurity: 5 best practice
09/25/2021 - CyberNews: Rob T. Lee, SANS Institute: nowhere is the workforce-skills gap more pronounced than in cybersecurity
09/23/2021 - Technically Media: These 11 leaders were named the best in Maryland cybersecurity
09/22/2021 - Utility Dive: What utility companies need to know about software bill of materials
09/16/2021 - Voice of CISO: SANS Institute introduces New cybersecurity Training
09/14/2021 - Campus Technology: SANS Institute Launches New Training for Entry-Level Cybersecurity Roles
09/05/2021 - Industrial Cyber: Industrial cybersecurity training comes into focus in advancing threat landscape
09/03/2021 - SC Media: Rethinking the approach to health care’s reliance on IT as security leaders
09/01/2021 - VeryWell Health: 4 Ways to Prove Your COVID-19 Vaccination Status
08/26/2021 - Enterprise Security Tech: Women's Equality Day 2021: Women in Cyber Are Stronger Together
08/24/2021 - Dark Reading: 4 Steps Organizations Can Take to Increase Diversity in Cybersecurity
08/12/2021 - MakeUseOf: What Is an Incident Response Plan?
08/04/2021 - CSO: How to prepare your Windows network for a ransomware attack
08/02/2021 -SearchSecurity: Improving the cybersecurity workforce with full spectrum development
07/21/2021 - Campus Technology: Women's Cybersecurity Training Program Expands with Google Support
07/14/2021 - IT World Canada: Is REvil ransomware gang gone for good or just taking a vacation?
07/13/2021 - Security Brief: Network security in the cloud more important than ever
07/10/2021 - Security Week: Hackers Scanning for Citrix Systems Affected by Recent Vulnerabilities
07/08/2021 - NBC News: 'Barely able to keep up': America's cyberwarriors are spread thin by attacks
07/08/2021 - ZDnet: The Chris Krebs case for including election systems as critical infrastructure
07/08/2021 - Government Executive: For Government Tech Workers, Certification Pays Off in Higher Salaries
07/08/2021 - The WSJ: New York City Opens Cyberattack Defense Center
06/28/2021 - SC Media: Ransomware: To pay or not to pay
06/19/2021 - TechBeacon: Go beyond policy: 5 keys to data protection compliance
06/10/2021 - CPO Magazine: What Can Brands Learn From the Facebook Data Leak?
06/03/2021 -SearchSecurity: DDoS defense planning falls short
05/30/2021 - The Washington Post: Colonial hack exposed government's light-touch oversight of pipeline cybersecurity
05/25/2021 - My Tech Decisions: You Need To Focus On These New Cybersecurity Threats
02/09/2021 - U.S.News & World Report: 10 Ways to Keep Your Cryptocurrency Safe
02/04/2021 - CSO: 10 ways to kill your security career
07/07/2020 - Help Net Security: Better cybersecurity hinges on understanding actual risks and addressing the right problems
07/06/2020- Dark Reading: Attackers Scan for Vulnerable BIG-IP Devices After Flaw Disclosure
06/23/2020 - Dark Reading: Cybercrime Infrastructure Never Really Dies
06/22/2020 - CIO Dive: Technology training, certifications demand withstands pandemic slump
06/18/2020 - Fox News: Sextortion is evolving during the coronavirus pandemic, report says
05/26/2020 - CNN Business: Virtual cybersecurity school teaches kids to fix security flaws and hunt down hackers
05/26/2021 - SearchSecurity: How to prevent firewall failures with proper testing and maintenance
03/30/2020 - Dark Reading: Securing Your Remote Workforce: A Coronavirus Guide for Businesses
03/20/2020 -ZDNet: Free resource to help parents keep kids safe online as schools move to eLearning
03/19/2020 - infosecurity magazine: SANS Offers Free Kit to Secure Home Workers
03/19/2020 - The Daily Swig: Coronavirus response: How security certification and training orgs are tackling the global disruption
03/09/2020 - infosecurity magazine: SANS: Gender Still Biggest Challenge for Many Women in Cyber
03/04/2020 - CSO: How to write an effective information security policy
03/04/2020 - Data Center Knowledge: Palo Alto Partnership May Boost Confidence in Google Cloud’s Chronicle
02/12/2020 - Security Boulevard: More CEOs Ditching Social Media Over Security Concerns
02/03/2020 - CSO: 9 CCPA questions every CISO should be prepared to answer
02/03/2020 - SearchSecurity: CISOs face a range of cybersecurity challenges in 2020
01/09/2020 - CSO: Winning the war for cybersecurity talent
12/20/2019 - SearchCompliance: Lack of data visibility obstructs value, storage costs and compliance
12/18/2019 - dvids: For the Army and DoD there are no 'losers' at SANS NetWars
12/17/2019 - CSO: Short on security expertise? You can still choose the right solutions
12/04/2019 - infosecurity magazine: Festive Virtual Hacker Conference Returns
11/14/1209 - infosecurity magazine: Capture the Flag Competition Aims to Trace Missing Persons
11/05/2019 - CSO: 5 keys to protect your supply chain from cyberattacks
10/29/2019 - Dark Reading: The Real Reasons Why the C-Suite Isn't Complying with Security
10/13/2019 - CSO: The CISO’s newest responsibility: Building trust
10/02/2019 - The Parallax: Harris poll backs Google plan to improve password security
09/18/2019 - SearchCompliance: Protect customer data with these 5 essential steps
09/03/2019 - Forbes: Teenage Hackers Wanted: Could Your Kid Be The Next £20M Cybersecurity Superhero?
08/15/2019 - SearchCloudSecurity: Research shows cloud security vulnerabilities grow
08/02/2019 - Forensic Focus: Interview: Lodrina Cherne, Product Manager, Cybereason
07/24/2019 - Dark Reading: 7 Stats That Show What it Takes to Run a Modern SOC
07/24/2019 - Data Center Knowledge: Why the WhatsApp Security Flaw Should Make Enterprise IT Nervous
07/17/2019 - infosecurity magazine: 75% of Security Awareness Pros Are Part Time
07/02/2019 - The Kojo Nnamdi Show: To Combat A Talent Shortage, Cybersecurity Companies Seek Diverse Candidates
07/01/2019 - SC Magazine: Women in Security: Women to Watch
06/20/2019 - California Apparel News: Retailers Take on the Fight Against Organized Crime
06/18/2019 - CSO: 6 signs the CIO-CISO relationship is broken — and how to fix it
06/14/2019 - SearchSecurity: SANS security awareness credential paves new career path
05/18/2019 - Patch: Hartford: Winners Of The 2019 Girls Go Cyberstart Competition Honored
05/03/2019 - Dark Reading: The 2019 State of Cloud Security
05/03/2019 - Bank Info Security: Trump Order Aims to Boost Federal Cybersecurity Workforce
04/18/2019 - Dark Reading: The Cybersecurity Automation Paradox
04/10/2019 - CSO: Google expands cloud security capabilities, including simpler configuration
04/09/2019 - Dark Reading: A New Approach to Application Security Testing
03/27/2019 - Dark Reading: Threat Hunting 101: Not Mission Impossible for the Resource-Challenged
03/19/2019 - WSJ Pro: Cyber Daily: Hope, Hype and AI; Defense Department Could Get Cyber Budget Boost
03/14/2019 - SearchCompliance: AI cybersecurity benefits are real, but not automatic
03/14/2019 - EnergyWire: Pentagon to utilities: Uncle Sam wants you
03/11/1209 - infosecurity magazine: #RSAC: The Most Dangerous New Attack Techniques & How to Counter Them
03/11/2019 - BankInfoSecurity: Why CISOs Need Partners for Security Success
03/07/2019 - HealthITNews: RSA 2019: SANS shares top new security threats – and what to do about them
03/07/2019 - SecurityBoulevard: RSA 2019: Day 4 Recap: Keynote Highlights, Capture the Flag, Public Interest Tech and More
02/25/2019 - infosecurity magazine: W. Va. Partners with SANS to Bring Girls into Cyber
02/13/2019 - CIO: 7 ways to ensure IT gets the credit it deserves
01/28/2019 - SearchHRSoftware: Attackers seek gold in HR data security breaches
01/02/2019 - ExecutiveGov: Gov't Launching First Employee Reskilling Academy for Cybersecurity
12/20/2018 - FOX8: Genealogist urges users to take consumer DNA kits with a grain of salt
12/04/2018 - Army.mil: Cyber Soldier attains 'most prestigious credential in the IT Security industry'
12/03/2018 - govloop: WHITE HOUSE LAUNCHES CYBER PROGRAM FOR NON-IT FEDS
11/30/2018 - fedscoop: Cybersecurity Reskilling Academy created by White House for federal employees
11/30/2018 - Federal News Network: Federal Cyber Reskilling Academy to retrain federal employees as cyber defense analyst
11/29/2018 - SearchSecurity: Is network traffic monitoring still relevant today?
11/06/2018 - Dark Reading: Why the CISSP Remains Relevant to Cybersecurity After 28 Years
10/28/2018 - Security Boulevard: Security Awareness: 5 Creative Ways to Train Employees on Cybersecurity
10/22/2018 - Dark Reading: Understanding SOCs' 4 Top Deficiencies
10/16/2018 - Forbes: Lance Spitzner: How To Secure The Human Operating System
10/11/2018 - CSO: What is enterprise risk management? How to put cybersecurity threats into a business context
10/09/2018 - CSO: 7 best practices for working with cybersecurity startups
09/06/2018 - Army.mil: 'Tiger Stance' focuses on realistic, state-of-the-art cyber task force training
08/28/2018 - InformationWeek: How Mid-Size Firms Can Overcome DevOps Challenges
08/20/2018 - FCW: Army cyber protection teams upgrade training with a 'real' city
08/16/2018 - Federal News Radio: In ‘Cybertropolis,’ Army begins to move its cyber training exercises into the physical world
08/05/2018 - WSJ: U.S. Officials Push New Penalties for Hackers of Electrical Grid
07/24/2018 - betanews: Endpoints leave industrial IoT vulnerable... Err, what's an endpoint?
07/17/2018 - CSO: 5 tips for getting started with DevSecOps
07/09/2018 - Dark Reading: Creating a Defensible Security Architecture
06/18/2018 - Security Boulevard: Language Matters When It Comes to a Data Breach
06/14/2018 - SearchSecurity: How to use the OODA loop to improve network security
05/29/2018 - WSJ: The Search for Women Who Want Cybersecurity Careers
05/15/2018 - Harvard Business Review: Internet Insecurity
05/08/2018 - CSO: Who wants to go threat hunting?
04/23/2018 - FCW: China's penetration of U.S. supply chain runs deep, says report
04/19/2018 - infosecurity magazine: #RSAC: The Five Most Dangerous New Attacks According to SANS
04/19/2018 - eWeek: Security Experts Warn of New Cyber-Threats to Data Stored in Cloud
04/19/2018 - IT Security Guru: SANS Experts Share Five Most Dangerous New Attack Techniques
04/19/2018 - CIODive: RSAC: 3 key cyberthreats to watch in 2018
04/19/2018 - CSO: Two incident response phases most organizations get wrong
04/19/2018 - informationsecuritybuzz: SANS Experts Share Five Most Dangerous New Attack Techniques
04/18/2018 - Fifth Domain: RSA - Future cyber threats will come from inside the architecture
04/13/2018 - NBC News: Jobs in cybersecurity are exploding. Why aren't women in the picture?
04/05/2018 - HelpNetSecurity: What’s new at RSAC 2018?
03/20/2018 - SearchSecurity: Secure DevOps: Inside the five lifecycle phases
03/20/2018 - IDGConnect: Testing the waters: The value of ethical hacking for business
03/01/2018 - CNN: China has found a new way to block banned words
02/14/2018 - Bank Info Security: How IoT Affects the CISO's Job
02/14/2018 - infosecurity magazine: Microsoft Vulnerabilities Accelerate in 2017
02/04/2018 - AP News: Woman at Top of Her Game Seeks Girls With a Cyber-Aptitude
01/22/2018 - CSO: Video with Rob Lee-SANS DFIR Curriculum Lead: The people you call when you've had a breach
01/12/2018 - CSO: Oracle WebLogic hackers pick Monero mining over ransomware
01/11/2018 - TechRepublic: How one hacker stole $226K worth of cryptocurrency from Oracle servers
01/10/2018 - Dark Reading: Oracle WebLogic Exploit Used in Cryptocurrency Mining Campaign
01/09/2018 - ArsTechnica: Oracle app server hack let one attacker mine $226,000 worth of cryptocoins
01/08/2018 - IT World Canada: Patching Meltdown/Spectre: Take your time, or get to it fast?
01/03/2018 - FE News: It's Time to Go Back to Basics to Address Cybersecurity Skills Shortages
01/03/2018 - PaymentsSource: PayThink Users are compromising most security tech
12/07/2017 - isBuzzNews: SANS Cybersecurity Trends And Predictions For 2018
12/06/2017 - statescoop: Missouri CISO honored with national award for work in cybersecurity
11/08/2017 - Defense Systems: Army pushes recruiting and retaining cyber talent
10/17/2017 - FCW: IRS pushes back on data protection criticisms
10/13/2017 - Dark Reading: Getting the Most Out of Cyber Threat Intelligence
10/10/2017 - SearchSecurity: Considerations for developing a cyber threat intelligence team
10/02/2017 - SearchSecurity: Is data-centric security worth the implementation challenge?
09/06/2017 - information age: What is the biggest threat to data? Ransomware of course
08/18/2017 - The Manufacturer - UK: Cyber security in industrial control systems
08/17/2017 - SearchSecurity Germany: ICS: Industrielle Steuerungsanlagen als Ziel von Ransomware
08/15/2017 - Search Security: Security Teams Must Embrace DevOps Practices or Get Left Behind
08/09/2017 - FCW: Can the U.S. Stop Malware and Buy it at the Same Time?
08/01/2017 - Data Center Knowledge: What Europe's New Data Protection Law Means for Data Center Operators
07/26/2017 - Dark Reading: Adobe's Move to Kill Flash Is Good for Security
07/27/2017 - SearchSecurity: What tools were used to hide fileless malware in server memory?
07/18/2017 - Dark Reading: SIEM Training Needs a Better Focus on the Human Factor
07/11/2017 - SecurityWeek: ICS Security Pros Increasingly Concerned About Ransomware: Survey
07/06/2017 - eSecurity Planet: How Not to Handle Incident Response: Automobile Association Exposes 117,000 Customers' Data
06/27/2017 - Threatpost: Complex Petya-Like Ransomware Outbreak Worse Than Wannacry
06/26/2017 - The Verge: Alexa's new calling feature means it's really time to set up two-factor authentication
06/21/2017 - CIO Insight: Security Awareness Programs Need Full-Time Staff
06/12/2017 - The Washington Post: Russia has developed a cyberweapon that can disrupt power grids, according to new research
06/06/2017 - SearchSecurity: How mobile application assessments can boost enterprise security
06/02/2017 - Dark Reading: How to Succeed at Incident Response Metrics
06/02/2017 - Computerworld: The top 5 mobile security threats
05/30/2017 - Dark Reading: Securing the Human a Full-Time Commitment
05/27/2017 - ZDNet: New awareness study reveals what you need for the best security programs
05/24/2017 - CSO: Few firms will be ready for new European breach disclosure rules, fines
05/22/2017 - CSO: Companies Ramp Up Recruiting Veterans as Cybersecurity Urgency Grows
05/03/2017 - DarkReading: 7 Steps to Fight Ransomware
04/26/2017 - CSIS Report: IoT, Automation, Autonomy, and Megacities in 2025
03/15/2017 - NBC Today: US infrastructure is at ‘red alert’ for hacking, expert says
03/13/2017 - Dark Reading: What Your SecOps Team Can (and Should) Do
03/07/2017 - Austin Business Journal: 5 reasons Austin businesses should hire 'good' hackers
03/01/2017 - Signal: Girding the Grid For Cyber Attacks
02/16/2017 - eweek: Ransomware Heads List of 7 Most Dangerous New Cyber-Attack Techniques
02/15/2017 - ZDNet: The seven most dangerous attack techniques: A SANS Institute rundown
02/15/2017 - PCWorld: The 7 security threats to technology that scare experts the most
01/31/2017 - Padtronics: Are IoT Devices Putting Your Organization at Risk?
01/27/2017 - CSO: Compliance focus, too much security expertise hurts awareness programs
01/26/2017 - Dark Reading: How I Would Hack Your Network (If I Woke Up Evil)
01/24/2017 - The Agenda: Confronting Cyber Conflict: Video with Robert M. Lee
01/23/2017 - WSJ: Yahoo Faces SEC Probe Over Data Breaches
01/11/2017 - Dark Reading: The 3 C's Of Security Awareness
01/04/2017 - gtm: The Real Cybersecurity Issues Behind the Overhyped ‘Russia Hacks the Grid’ Story
12/21/2016 - CBS News: Video: Russian hacks into Ukraine power grids may be a sign of things to come
11/29/2016 - WSJ: Attack Crashes Nearly 1M Deutsche Telekom Internet Routers
11/28/2016 - Wired: SF’s Transit Hack Could’ve Been Way Worse—And Cities Must Prepare
11/28/2016 - Dark Reading: Time For Security & Privacy To Come Out Of Their Silos
11/01/2016 - SearchSecurity: Want a board-level cybersecurity expert? They're hard to find
11/01/2016 - Dark Reading: Why Enterprise Security Teams Must Grow Their Mac Skills
10/27/2016 - Dark Reading: How To Build A Strong Security Awareness Program
10/27/2016 - Forensic Focus: Malware Can Hide, But It Must Run
10/19/2017 - CSO: Cybersecurity 'ninjas' value challenges, training and flexible schedules over pay
10/10/2016 - HealthITSecurity: Reviewing File Transfer Protocol Healthcare Cybersecurity Risks
10/06/2016 - CSO: Evolving risks and business technologies shift focus in security budgets
09/19/2016 - CSO: Performance, management and privacy issues stymie SSL inspections, and the bad guys know it
09/15/2016 - CSO: Awareness training: How much is too much?
08/15/2016 - eSecurity Planet: How to Mitigate Fourth-Party Security Risks
08/11/2016 - fedscoop: EPA releases limited summary of cybersecurity report
08/11/2016 - fedscoop: Interior falls short in logical access control standards - report
08/01/2016 - The Parallax: How to Send Money Securely
07/29/2016 - MotherBoard: What Are the Risks of Hacking Infrastructure? Nobody Really Knows
07/28/2016 - SearchSecurity: How InfoSec professionals can improve their careers through writing
07/26/2016 - SANS State of App Sec report: It's not just about dev teams
07/21/2016 - Energy Wire: Utilities look back to the future for hands-on cyberdefense
07/20/2016 - EnergyWire: Grid hack exposes troubling security gaps for local utilities
07/14/2016 - fedscoop: Survey: Health industry cyber pros moving beyond compliance
07/12/2016 - fedscoop: 'We're lucky someone wasn't killed: A look at the patent office's Christmas outage
07/08/2016 - Network World: Confusion over cyber insurance leads to coverage gaps
06/27/2016 - Cybernance: Who'll Be the Gap Closer in Cyber Insurance?
06/22/2016 - CSO: Concerns about security, information sharing up among industrial control system security pros
06/22/2016 - SecurityWeek: ICS Security Not Improving, Despite More Attacks
06/20/2016 - The Cybersecurity Podcast: Hackers Infiltrated Ukraine's Power Grid. What's Next? With Rob M. Lee
06/10/2016 - Security Intelligence: The Evolving State of the Mobile Endpoint
06/07/2016 - energy central: How to build NERC CIP compliance: a new course by the SANS Institute
06/03/2016 - Archer Energy Solutions: Secret malware targets critical systems that move your world
05/24/2016 - the energy connective: What Utilities Are Still Learning About the Ukraine Cyberattacks
05/13/2016 - CSM Passcode: Hard lessons for Energy Dept., power sector after Ukraine hack (+video)
05/05/2016 - TechRebublic: LAPD hacks iPhone 5s, proves they don't need Apple backdoor
04/29/2016 - TechRepublic: Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge
04/08/2016 - CSO: Consider the Panama Papers breach a warning
03/30/2016 - TechRepublic: Apple demands to know how FBI cracked San Bernardino iPhone
03/28/2016 - Forbes: Calling All Women: The Cybersecurity Field Needs You And There's A Million Jobs Waiting
03/23/2016 - Forbes: Meet The Ex-Army Hackers Trying To Save America From Blackouts
03/15/2016 - FCW: Why Mobile Data Security Matters
03/13/2016 - WSJ: Cybersecurity Training, Military Style
03/11/2016 - Bloomberg: In the Age of Cybercrime, the Best Insurance May Be Analog
03/10/2016 - FP: With Power Plants Getting Hacked, Senate Looks For Ways To Keep The Lights On
03/09/2016 - ComputerWorld: Experts warn that 'chip off' plan to access terrorist's iPhone is risky
03/03/2016 - TechBeacon: 5 emerging security technologies set to level the battlefield
03/03/2016 - CSO: Cybersecurity no longer merger afterthought
03/03/2016 - Dark Reading: 7 Attack Trends Making Security Pros Sweat
03/08/2016 - ZDNet: Why the connected car is one of this generation's biggest security risks
02/29/2016 - New York Times: Utilities Cautioned About Potential for a Cyberattack After Ukraine’s
02/29/2016 - Baseline: IT Security Teams Are Stretched to the Limit
02/29/2016 - BBC: Ukraine cyber-attacks 'could happen to UK'
02/24/2016 - Security Insider: Ausbildung und Zertifizierung von IT-Security-Experten
02/21/2016 - Computerwoche: Wie Ihr Security-Training erfolgreich wird
02/16/2016 - Marketplace: Hacking competitions burnish cybersecurity resume
02/02/2016 - channelinsider: 12 Key Facts About the True Costs of Data Breaches
01/28/2016 - SECTANK: Windows 10 liefert mit 'Credential Guard' wichtige Sicherheitsfeatures
01/27/2016 - ItBusinessEdge: Why Mobile Apps Are Not Getting More Secure
01/26/2016 - CSO: Preparation lowers long-term post-breach costs
01/21/2016 - CNN: Hackers could secretly tap into corporate meetings
01/21/2016 - CSO: How much at risk is the U.S.'s critical infrastructure?
01/20/2016 - fedscoop: Interior Department FISMA audit reveals shortcomings in emergency planning
01/20/2016 - Wired: Everything We Know About Ukraine's Power Plant Hack
01/19/2016 - ITBusinessEdge: The IoT, IPv6 and DDoS: A Dangerous Mix
01/18/2016 - CNN: Scary questions in Ukraine energy grid hack
01/08/2016 - Foreign Policy: Did Russia Knock Out Ukraine's Power Grid?
01/05/2016 - The Washington Post: Russian hackers suspected in attack that blacked out parts of Ukraine
01/04/2016 - Motherboard: Malware Found Inside Downed Ukrainian Grid Management Points to Cyberattack
01/04/2016 - Forbes: 30 under 30 in Enterprise Technology: Robert M. Lee
01/02/2016 - Security Insider: Wie lief der Angriff auf das Stromnetz der Ukraine?
12/21/2015 - The Dallas Morning News: Breach of power: Foreign hackers prove capable of crippling U.S. electric grid
12/14/2015 - datensicherheit.de: Smartphone-Forensik: Interessantes Feld für Cyber-Untersuchungen
11/27/2015 - TechRepublic: SSH getting a security tune-up from NIST and IETF
11/20/2015 - Dark Reading: Introducing 'RITA' for Real Intelligence Threat Analysis
11/17/2015 - CSO: Closing the cybersecurity talent gap, one woman at a time
11/17/2015 - eWeek: Businesses Lack Resources to Defend Against Cyber-Attacks
11/12/2015 - CSO: Is the board's involvement in cybersecurity really that critical?
11/11/2015 - ITPRO: Parking fine clerk graduates as world-leading cybersecurity talent
11/01/2015 - CBS News: In the dark over power grid security with Larry Pesce, SANS Instructor
10/06/2016 - infosecurity: To Stop APTs You Need Anticipatory Active Defenses
10/06/2015 - SearchSecurity: How to perform a forensic acquisition of a virtual machine disk
09/24/2015 - TechRepublic: The Windows 10 privacy debacle: Five big issues to consider
09/11/2015 - Dark Reading: The Truth About DLP & SIEM: It’s A Process Not A Product
09/08/2015 - WSJ: Phishing Schemes Target IT Workers at Critical Infrastructure Companies
09/24/2015 - Campus Technology: Data Security in Higher Ed – A Moving Target
08/19/2015 - CSO: CISOs facing boards need better business, communication skills
08/04/2015 - TechTarget: Enterprise IoT Security: Is the sky truly falling?
07/31/2015 - CSO: Neiman Marcus case a reminder to check your cyber coverage
07/31/2015 - infosecurity: SANS Announces Recruitment Fair for Top Infosec Candidates
05/08/2015 - IT Administrator: Penetration Tests in drahtlosen Umgebungen
07/20/2015 - Dark Reading: How I Learned To Love Active Defense
07/16/2015 - CSO: Regulators seek to limit security software exports
06/08/2015 - SearchCloudSecurity: Using a VMware firewall as part of a defense-in-depth strategy
07/16/2015 - CSO: Electronic Frontier Foundation celebrates 25 years of defending online privacy
07/17/2015 - IT-Director: Riskante Penetrationstests
06/22/2015 - Military Times: Cybersecurity degrees are job magnet
06/19/2015 - infosecurity: SANS Cyberskills Self-Assessment Addresses Skills Shortage
06/16/2015 - CNN: FBI investigating whether Cardinals Hacked Astros
06/08/2015 - SNL: Experts warn utilities to watch for cyberattacks via substation break-ins
05/20/2015 - IT Job Magazin: SANS Institut bildet weltweit Cyber-Spezialisten aus
06/06/2015 - CNN Video: Rob Lee Discusses the OPM.GOV Hack
06/03/2015 - CNN: Mac attack! Nasty bug lets hackers into Apple computers
06/02/2015 - NetworkWorld: Experts divided on security implications of DOJ's deal with Box
05/12/2015 - Smart Grid Today: SECURITY EXPERTS: Utility IT, OT still miles apart
05/06/2015 - Medical Product Outsourcing: Device Insecurity
04/26/2015 - CBS News Video: Strengthening the nation's defense against hackers
04/28/2015 - infosecurity: DDoS, Lizard Squad and Preparing for Cyber-War
04/27/2015 - Motherboard: Did Iran Launch a Cyberattack Against the US? Probably Not, New Report Says
04/23/2015 - Dark Reading: 6 Most Dangerous New Attack Techniques in 2015
04/22/2015 - TheDailyDot: Security companies accused of exaggerating Iran's cyberthreats against the U.S.
04/20/2015 - Security Insider: Traumjob Pen Tester : Mit ‚kriminellem‘ Gespür Sicherheit schaffen
04/17/2015 - threatpost: Active DoS Exploits for MS15-034 Under Way
04/16/2015 - Computerworld: Experts boost threat level, call for patching critical Windows bug ASAP
04/16/2015 - DarkReading: Microsoft Zero-Day Bug Being Exploited In The Wild
04/16/2015 - threatpost: Ransomware Teslacrypt Still Targeting Gamers
04/15/2015 - IT Security Guru: SANS launches Cyber Academy to train cyber skills in eight weeks
04/15/2015 - SECTANK: Perspektiven in der Sicherheitsberatung (III) – Trainings: „Qualität hat ihren Preis“
04/09/2015 - MicroScope: Lack of soft skills harming security awareness programmes
04/01/2015 - SearchSecurity: New cyberthreats: Defending against the digital invasion
04/01/2015 - CSMonitor: Obama's cyber sanctions order adds punch to fight against foreign hackers (+video)
04/01/2015 - SecurityInsider: Internet Storm Center sucht Anomalien im Web Traffic
03/25/2015 - SearchSecurity: Using NIST 800-125-A to understand hypervisor security threats
03/23/2015 - CBC News: CyberCity: Model town on front line of digital terrorism
03/19/2015 - Today Show Video (w/ SANS Instructor James Lyne) – Are free Wi-Fi hotspots secure?
03/15/2015 - ComputerWorld Artikel: Industriekontrollsysteme ausser Kontrolle
03/14/2015 - Washington Post: As governor, Jeb Bush used e-mail to discuss security, troop deployments
03/10/2015 - Business Insider: Experts are skeptical that Hillary Clinton's 'homebrew' email server could withstand cyberattacks
03/09/2015 - threatpost: New Technique Complicates Mutex Malware Analysis
03/07/2015 - The Daily Beast: Hillary's Secret Email Was a Cyberspy's Dream Weapon
02/13/2015 - Computerworld: Partly cloudy with a chance of hacking?
02/13/2015 - SecurityWeek: Netatmo Weather Stations Expose Wi-Fi Passwords: Researcher
02/07/2015 - New York Times: Data Breach at Anthem May Lead to Others
01/27/2015 - SearchCloudSecurity: Implementing VMware border router ingress and egress filtering
01/21/2015 - U.S. News & World Report: Choose the Right Online IT Training
01/21/2015 -TheDailyDot: Hospitals prepare for the fight against hackers
01/20/2015 -WSJ: CIOs Eye Obama Cybersecurity Push with 'High Level of Interest'
01/13/2015 - CSO: Obama proposes new 30-day data breach notification law
12/23/2014 - USA Today: Key industries train to thwart cyber attacks
12/18/2014 - realtimes: what lies in wait: security threats in 2015
12/22/2014 - CSO: 5 lessons to help security pros craft a New Year's resolution
12/08/2014 - SearchCloudSecurity: Understanding VMware ESXi hypervisor security features
12/10/2014 -CSO: Why the board of directors will go off on security in 2015
infosecurity: SANS Warns of Shellshock Attacks on NAS Kit
SearchSecurity: Using secure network tiers to bolster network security rules
WSJ: CIOs and CISOs Can Learn From the Massive Sony Data Breach
infosecurity: Cyber-Security SANS Frontières: An Interview with Lance Spitzner
NetworkWorld: 5 ways to escape password hell
SearchSecurity: Using crypto-free zones to thwart advanced attacks
Forbes: America's Critical Infrastructure Is Vulnerable To Cyber Attacks
SearchSecurity: Operational challenges as cybersecurity gets sensored
CSO: Apple's iWorm fix still leaves major hole
CU Info Security: White House Hack: A Lesson Learned
Forbes: Operational Resilience - Not Just Technology Security - Drives Competitive Advantage
WSJ: Sabotage Investigation Highlights Poor Network Monitoring at Utilities
CSO: Did researchers help hackers in releasing USB drive exploit?
CSO: Three scary, but true, security tales
Ars Technica: Shellshock fixes beget another round of patches as attacks mount
CSO: Six key defenses against Shellshock attacks
SearchSecurity: Attackers already targeting Bash security vulnerability
HealthCare Info Security: Ramping Up Medical Device Cybersecurity
SearchSecurity: How to build complex passwords and avoid easy breaches
CSO: Why retailers like Home Depot get hacked
SearchSecurity: The case for NAC-based continuous monitoring for attack detection
InformationWeek: HealthCare.gov Breach: The Ripple Effect
SearchSecurity: Apple two-factor authentication fail leaves iCloud users vulnerable
Bloomberg TV: Is This How Jennifer Lawrence Got Hacked
SearchCloudSecurity: Following iCloud hack, experts say enterprise data likely at risk
Dice: 4 Interview Qs for Network Penetration Testers
HealthCare Info Security: Breach Response: Are We Doing Enough?
DevOps: Internet of Things (IoT) poses challenges for DevOps and security
Security that works: Three must-have enterprise security fundamentals
ZDNet: In wake of hacks, incident response efforts weak in enterprise
Government Technology: Crooks are Winning Cyber War, Experts Say
IT World Canada: SQL injection attacks can be stopped, says security expert
CSO: Defensive tactics against sophisticated cyberspies
Associated Press: T1red of p@sswords? Y0u @re N*t @lone!
CSO: Today's top skill sets in security -- and why they're in demand
Dark Reading: Security Pro File: Spam-Inspired Journey From Physics To Security
Dark Reading: New OpenSSL Flaw Exposes SSL To Man-In-The-Middle Attack
NetworkWorld: New OpenSSL vulnerability called not as serious as Heartbleed
BizTech: Q&A: A Word With Security Expert John Pescatore
eWeek: Health Care Sector Faces Rising Pressure to Bolster Data Security
CNBC: Cyberwarfare: Protecting 'soft underbelly' of USA
Careers Info Security: Why InfoSec Pay Shows Lackluster Gains
SearchSecurity: John Pescatore: Evasion techniques aiding advanced targeted attacks
CSO: Open campus, security nightmare
CSO: A security awareness short list from SANS
SearchSecurity: John Pescatore: BYOIT, IoT among top information security trends
infosecurity: Infosecurity Europe 2014: Worst Security Threats go Undetected, Warns Dr Eric Cole
CSO: In a world of complexity, focus on the basics
ComputerWeekly: Cyber threat detection paramount, says SANS fellow
SearchSecurity: Good information security leadership demands focus on shared knowledge
CSO: Tech titan funding just a start in securing critical open-source projects
FederalNewsRadio: Listen to Interview with Alan Paller on Heartbleed
Security Bistro: What’s Needed Now: Supply Chain Integrity Testing
PC Advisor: Think tank challenges Heartbleed handwringing
CSO: Here are the options with Heartbleed-flawed networking gear (Hint: there aren't many)
infosecurity: SANS’ Eric Cole Gets Infosecurity Europe Hall of Fame Nod
Bloomberg: NSA Said to Exploit Heartbleed Bug for Intelligence for Years
SearchSecurity: 'Heartbleed' OpenSSL vulnerability: A slow-motion train wreck
Forbes: Avoiding Heartbleed Hype, What To Do To Stay Safe
ZDNet: Businesses need to inform users about Heartbleed exposure
The Register: Not just websites hit by OpenSSL's Heartbleed – your PC and phone may be in peril too
ZDNet: Smart malware campaign attacks only Android
FierceCIO: Rise of the CSO: a CIO's power threat or job savior?
CSO Magazine: Info sec industry still struggles to attract women
WSJ: How Utilities Can Shore up Windows XP Security
CIO Insight: The Complicated Relationship Between CIOs and CSOs
InfoWorld: A clear-eyed guide to Mac OS X's actual security risks
Network World: Focus on fundamentals to reduce data breaches, expert advises
CSO Magazine: CyberLocker's success will fuel future copycats
Signal Magazine: Resolving the Critical Infrastructure Cybersecurity Puzzle
CSO Magazine: SANS seeks feedback in salary survey
SC Magazine: RSA 2014: Experts discuss the most dangerous new attack techniques
Security Week: Linksys Router Worm Spreading
Forbes: New Cyberthreat Report By SANS Institute Delivers Chilling Warning To Healthcare Industry
Healthcare Info Security: Study: Endpoint Vulnerabilities Common
WSJ: Medical Devices Can Lead to Breaches
Energy.Gov: Securing the Nation’s Grid
SearchSecurity: Cyberthreats: Know thy enemy in 2014
NY Post: Yahoo e-mail customers’ names, passwords stolen
SC Magazine: Attacker extorts coveted Twitter username in elaborate social engineering scheme
FCW: Is cybersecurity the right job for you?
Security Week: Cyber Attack Leverages Internet of Things
Design News: Fuzzing Framework Fights Control Hackers
Federal News Radio: Target Breach interview with Johannes Ullrich
Careers Info Security: Top 10 InfoSec Careers Influencers
CSO Magazine: Rising impact of Target breach indicates deeper hack into systems
CBC News: Snapchat hack shows vulnerable side of smartphone apps
threatpost: Probes Against Linksys Backdoor Port Surging
Nextgov: The Ten Worst Hacks of 2013
Nextgov: Awards Recognize Best in Government Cybersecurity
Security Week: Alleged NSA Payment to RSA Raises New Fears of Gov't Undermining Crypto Security
Network World: Take the 10th annual SANS Institute Holiday Hacking Challenge
CSMonitor: Target data theft: worrying sign of cyber thieves' sophistication
threatpost: Facebook Phishing Campaign Employing Malicious Tumblr Pages
ComputerWorld: 300 victims report fake support calls to security org
Nextgov: Master's Accreditation Benefits Federal Cyber Pros
Course Review: SANS SEC 760 Advanced Exploit Development for Penetration Testers
CSO Magazine: Can we use Big Data to stop healthcare hacks?
internet evolution: IT Security Pros Click Into CyberWar
SC Magazine: The coming Internet of Things
Nextgov: Cybersecurity Experts Will Face Off in Mock NetWars
WSJ: U.S. Gives Companies Cybersecurity Guidelines to Protect Critical Infrastructure
HealthITSecurity: CISO focuses on compliance, collaboration for SANS summit
Federal News Radio: DHS, SANS Institute join forces to give agencies cyber primer
NetworkWorld: New GIAC certification advances industrial cyber security
Certification Magazine: New GIAC cert aimed at protecting industry and infrastructure
CSO Magazine: What the Internet of Things means for security
NBC News: Cyber defenders are in short supply as hacking wars escalate
Control Engineering: Cyber security experiment reveals threats to industrial systems
eWeek: Cyber-Security in 2013: Software, People Still Have Vulnerabilities
ComputerWorld: Shutdown could delay government's patching of IE, Windows and .NET flaws
ComputerWorld: Adobe hack shows subscription software vendors lucrative targets
TechRepublic: Researchers reverse-engineer the Dropbox client: What it means
MIT Technology Review: Dropbox and Similar Services Can Sync Malware
CSO Magazine: CSOs: Stop flogging the threats and start providing solutions
Business News Daily: Here Comes Windows 8.1 — Should You Upgrade?
Infosecurity: Former DHS Secretary Launches Council on Cybersecurity
Infosecurity: SANS: Internet of Things Must Drive Fresh Security Approaches
Security Bistro: Thinking About How to Secure the Internet of Things (IoT)
How to make a bazillion dollars in 2014 from Windows XP
HealthITSecurity: Engaging users to augment healthcare security training
Course Review: SANS SEC573 Python for Penetration Testers
NPR: U.S. Worries NSA Leaker's Files Could Be Hacked
So, You Wanna Be a Penetration Tester?
CSO Magazine: 5 questions with Alissa Torres, SANS Instructor and Incident Handler at Mandiant
WSJ: The Morning Download: Gas Industry Lobbies Against Cyber Standards
NetworkWorld: Security analytics will be the next big thing in IT security
CyberCity: Training Ground For The Navy SEALs Of Online Defense
CNN: America's next threat: Cyberterrorism?
Ecommerce Times: Market Jitters Hint at Social Hacks' High Threat Level
CSO Magazine: Social engineering in penetration tests: 6 tips for ethical (and legal) use
TechTarget: Trusted platform module aids Windows mobile device security
Nextgov: New Tool Can Help Agencies Assess Cyber Skills
AutomationWorld: An Education in Cyber Security
Government Technology: Colorado Embraces New IT Security Philosophy
New York Times: Luring Young Web Warriors Is a Priority. It’s Also a Game.
NetworkWorld: New course teaches techniques for detecting the most sophisticated malware in RAM only
Cybersecurity's Skills Deficiency: Paller: 'There's No Pipeline' of Deep-Knowledge Pros
InformationWeek: China Hack Attacks: Play Offense Or Defense?
SearchSecurity: Emerging threats include kinetic attack, offensive forensics: RSA 2013
CRN: 5 Most Dangerous New Hacking Techniques
Control Engineering: Michael Assante and Tim Conway offer security suggestions for plant operators
Bank Info Security: CISOs Building Credibility
New York Times: Some Victims of Online Hacking Edge Into the Light
CSO: How Colorado's CISO is revamping the state's information security -- on a $6,000 budget
Fox News: Cyber Experts Needed, But There's a Skills Gap
LA Times: Hackers target Western news organizations in China
NBC News: Cyber watchdogs worry about worker shortage
3 terrifying, but true, security tales
4 Ways to Spot an Internet Scam
A Tiny City Built To Be Destroyed By Cyber Terrorists, So Real Cities Know What’s Coming
AirForceTimes: Cybersecurity personnel to have new mission
Businessweek: The Battle to Protect Confidential Data
BYOD offers tricks and treats for enterprises, say analysts
CIO: SANS NetWars tests cybersecurity pros against peers
CNN: Scammers create fake donation websites for Sandy victims
Comprehensive Cybersecurity: Securing the Human Operating System
Course Review: SANS FOR408 Computer Forensic Investigations – Windows In-Depth
CSO: It's time to start patching the Human OS
Dark Reading: ‘CyberCity’ Faces Its First Attacks Next Month
Dice: Did Fried Brain Cells Bag John McAfee?
Forbes: The Cloud's Not-So-Secret Weak Link
Forensics: When is Data Truly Lost?
GCN: NetWars helps develop the future of cybersecurity
Hackers claim 12 million Apple IDs from FBI
InfoWorld: Eric Cole: Interview with a remarkable security guru
Inside a Forensics Investigation
IT Security Police: 'Step Away From That IE'
NetWars Tournament of Champions Tests the Skills of the Nation’s Top Cyber Security Practitioners
NetworkWorld: Want to develop cybersecurity skills? Try SANS Institute's NetWars
New Cyber Group Aims To Spread Basic Security
Potential for Sandy scams prompts warnings
SearchSecurity: Custom, targeted malware attacks demand new malware defense approach
SearchSecurity: NetWars CyberCity missions to improve critical infrastructure protection
Tool Scans for RTF Files Spreading Malware in Targeted Attacks
Washington Post: CyberCity allows government hackers to train for attacks
Whitelisting Traffic: A practical Exercise for Network Defenders
SANS CyberCon 2012: It's A Secret
Forbes: Spammers Are Using Facebook To Impersonate Your Friends
NY Post: White-hat cyberbug bounty nets cash
CIO: How to Secure Data by Addressing the Human Element
Lack of Cyber Career Paths and Training Standards Stymies Security
Google Switches On Browser Spy Cam in Chrome
Microsoft provides workarounds for Oracle vulnerability
DNS Changer: Cyber Criminals, Internet Access And The FBI
Washington Post: Cybersecurity chief urges action by Congress
DNSChanger apocalypse: Like Y2K, but even snoozier
CSO: Alan Paller on cutting through the bull
DNS Changer virus threat passes; no significant outages
Thousands risk Internet shutdown as U.S. fix expires
Botnet infections in the enterprise have experts advocating less automation
The AC/DC lesson: Why IPv4 will be with us a long time
Best practices for data encryption, Part 1
SANS Digital Forensics and Incident Response Summit
SearchSecurity: Password database inventory required following LinkedIn breach
InfoWeek: LinkedIn Password Breach: 9 Facts Key To Lawsuit
CSO: Advanced persistent threats can be beaten, says expert
Understanding and defeating APT, Part 2: Fighting the 'forever war' against implacable foes
Understanding and defeating APT, Part 1: Waking up to the who and why behind APT
How Ethical Hackers Make Computers Safer
SearchSecurity: Kaspersky Flame malware poses little threat to businesses
NetworkWorld: New approaches to combat 'sources of evil' and other security issues
Old remedies don’t work on new threats; SANS panel will discuss alternative medicine
Despite increased infosec spending, breaches and frustration are on the rise
3 Incident Response Essentials with Rob Lee
Interview with Ed Skoudis: SANS Cyber Guardians hack to help America win the cyberwar
Interview with SANS' Ed Skoudis: America losing the cybersecurity war to hackers
Vermont Tech student takes first place in computer skills tournament
Pitting Education Against Cyber Attacks
CIO: Mobile Malware: Beware Drive-by Downloads on Your Smartphone
SC Magazine: The six most dangerous infosec attacks
Ed Skoudis: RSA Conference Flash Talks 2012
Air Force aims to turn cyber into a career
SC Magazine: SANS builds digital certificate checker
The 10 Biggest Online Security Myths - And How to Avoid Them
CIO: How to Make Time for Continuing Education and Career Development
Mobile Device Security Expert Q&A Part II: Start treating phones as computers
Mobile Device Security Expert Q&A Part I: Where BYOD policy goes wrong
InformationWeek: 7 Ways To Toughen Enterprise Mobile Device Security
A Career in Forensics: 5 Key Steps
Implement user security awareness training
Forbes: Conversations On Cybersecurity: The Trouble With China, Part 1
Smart phones getting out of control? SANS hosts first Mobile Device Security Summit
REMnux 3 review – a treasure chest for the malware-curious
ComputerWorld Artikel: Industriekontrollsysteme ausser Kontrolle