homepage
Open menu
Go one level top
  • Train and Certify
    Train and Certify

    Immediately apply the skills and techniques learned in SANS courses, ranges, and summits

    • Overview
    • Courses
      • Full Course List
      • Training Roadmap
      • Training Formats
        • OnDemand
        • In-Person
        • Live Online
    • GIAC Certifications
    • Training Events & Summits
      • Event Locations
        • Americas
        • Europe & Middle East
        • Asia Pacific
      • Summits
    • OnDemand
    • Get Started in Cyber
      • Bachelors & Masters Degrees
      • Scholarships
    • Cyber Ranges
  • Manage Your Team
    Manage Your Team

    Build a world-class cyber team with our workforce development programs

    • Overview
      • Why Work with SANS
      • Industries
    • Group Purchasing
    • Build Your Team
      • Team Development
      • Assessments
      • Private Training
      • Hire Cyber Professionals
    • Leadership Training
  • Security Awareness
    Security Awareness

    Increase your staff’s cyber awareness, help them change their behaviors, and reduce your organizational risk

    • Overview
    • Products & Services
      • Security Awareness Training
        • EndUser Training
        • Phishing Platform
      • Specialized
        • Developer Training
        • ICS Engineer Training
        • NERC CIP Training
        • Healthcare Training
      • Risk Assessments
        • Knowledge Assessment
        • Culture Assessment
        • Behavioral Risk Assessment
    • OUCH! Newsletter
    • Career Development
    • Blog
    • Partners
  • Resources
    Resources

    Enhance your skills with access to thousands of free resources, 150+ instructor-developed tools, and the latest cybersecurity news and analysis

    • Overview
    • Webcasts
    • Summits & Forums
    • Content
      • Newsletters
        • NewsBites
        • @RISK
        • OUCH! Newsletter
      • Blog
      • Podcasts
      • Summit Presentations
      • Posters & Cheat Sheets
    • Research
      • White Papers
      • Security Policies
    • Tools
    • Focus Areas
      • Cyber Defense
      • Cloud Security
      • Digital Forensics & Incident Response
      • Industrial Control Systems
      • Cyber Security Leadership
      • Offensive Operations
  • Get Involved
    Get Involved

    Help keep the cyber community one step ahead of threats. Join the SANS community or begin your journey of becoming a SANS Certified Instructor today.

    • Overview
    • Join the Community
    • Work Study
    • Teach for SANS
    • CISO Network
    • Partnerships
    • Sponsorship Opportunities
  • About
    About

    Learn more about how SANS empowers and educates current and future cybersecurity practitioners with knowledge and skills

    • SANS
      • Overview
      • Our Founder
      • Awards
    • Instructors
      • Our Instructors
      • Full Instructor List
    • Mission
      • Our Mission
      • Diversity
      • Scholarships
    • Contact
    • Frequent Asked Questions
    • Customer Reviews
    • Press
    • Careers
  • SANS Sites
    • GIAC Security Certifications
    • Internet Storm Center
    • SANS Technology Institute
    • Security Awareness Training
  • Search
  • Log In
  • Join
    • Account Dashboard
    • Log Out
  1. Home >
  2. Press >
  3. SANS in the News

SANS in the News

  • 06/16/2022 - National Governors Association - Re-Envisioning State Cyber Response Capabilities: The Role Of Volunteers In Strengthening Our Systems
  • 06/16/2022 - Health IT Security - Operational Technology (OT) Security Risks, Best Practices in Healthcare
  • 06/15/2022 - Dark Reading- Veterans Explain How Military Service Prepared Them for Cybersecurity Careers
  • 06/15/2022 - Security Boulevard - Build Your Career in Cybersecurity: Essential Jobs and Salary in 2022
  • 06/15/2022 - IT Pro - The rise of phishing as a service (PhaaS) and how to tackle it
  • 06/14/2022 - Emilio Cogliani - Top 10 zero day attack prevention best practices 2022
  • 06/14/2022 - Help Net Security - Saas security: How to avoid “death by 1000 apps
  • 06/14/2022 - Analytics Blog - Network Security Certifications to Combat Growing Data Breach Threats
  • 06/14/2022 - Task and Purpose - Why this ‘large man in a ghillie suit’ is the hero the military needs right now
  • 06/13/2022 - National Cyber Security News Today - Massachusetts National Guard Plays Key Role in Cyber Shield 2022, the DoD’s Largest Unclassified Cyber Defense Exercise
  • 06/13/2022 - Dark Reading - Microsoft Patches 'Follina' Zero-Day Flaw in Monthly Security Update
  • 06/11/2022 - DvidsHub.net - Hawaiian Shirts, Flipflops, a Ghillie Suit, and a Ukulele Player: Military Cyber Defenders Battle Each Other in ‘Netwars’
  • 06/10/2022 - Biz Tech Magazine - Everything Old Is New Again for Hackers
  • 06/02/2022 - IT Web - SA women invited to apply for cyber security scholarship
  • 06/01/2022 - Channel Life - Taking a data-driven approach to SOC operations
  • 06/01/2022 - IT News Africa - R110,000 Cybersecurity Scholarship Launched for Women of Colour in South Africa
  • 06/01/2022 - Cybersecurity Dive - Microsoft zero-day under attack as industry awaits patch
  • 06/01/2022 - Security Week - Chinese Threat Actors Exploiting 'Follina' Vulnerability
  • 06/01/2022 - Hackread - Unofficial Micropatch for Follina Released as Chinese Hackers Exploit the 0-day
  • 06/01/2022 - ReadMe - ‘Pull the fire alarm.’ Cybercriminals rush to exploit Microsoft zero-day
  • 05/31/2022 - California18 - Zero-day vulnerability in MS Office: Microsoft makes recommendations
  • 05/31/2022 - Information Security Buzz - Microsoft Vulnerability Named Follina
  • 05/31/2022 - Dark Reading - New Microsoft Zero-Day Attack Underway
  • 05/31/2022 - Market Research - Threat Intelligence Market Expectations & Growth Trends Highlighted Until 2031
  • 05/31/2022 - CSO Online - 2022 CSO Hall of Fame honorees
  • 05/31/2022 - ORAM Corporate Advisors - ORAM’s Complete Guide to Password and Passphrase Security in 2022
  • 05/31/2022 - Federal News Network - Medical devices are the soft cybersecurity underbelly for health care providers
  • 05/31/2022 - Bleeping Computer - Aligning Your Password Policy enforcement with NIST Guidelines
  • 05/29/2022 - Industrial Cyber - ICS cybersecurity training can help fight off adversarial attacks in evolving threat landscape
  • 05/28/2022 -Insurance Business (AUS) - Why insurance CEOs should be technology geeks
  • 05/27/2022 - Bleeping Computer - Add cybersecurity skills to your resume with this training bundle deal
  • 05/25/2022 - Security Boulevard - Popular Python package compromised: Don’t ‘Blindly Trust Open Source’
    • 05/24/2022 - SecurityWeek - PyPI Served Malicious Version of Popular 'Ctx' Python Package
    • 05/24/2022 - TechTarget - Developers targeted by poisoned Python library
    • 05/24/2022 - TechRegister (UK) - Developers targeted by poisoned Python library
    • 05/24/2022 - The Hacker News - Popular PyPI Package 'ctx' and PHP Library 'phpass' Hijacked to Steal AWS Keys
    • 05/24/2022 - SecurityWeek - PyPI Served Malicious Version of Popular 'Ctx' Python Package
    • 05/23/2022 - Neotel Segurança Digital (BR) - What is Port Scanning?
    • 05/21/2022 - Insurance Business (AU) - Insurers - here's an alternative to partnering with an insurtech
    • 05/20/2022 - cyberwire - Notes from the cyber phases of a hybrid war 
    • 05/20/2022 - Professional Security (UK) - Cyber and the Law 
    • 05/20/2022 - The Wall Street Journal - Third-Party Cyber Risk Management Primer
    • 05/19/2022 - CIO Korea (APAC) -  12 steps to building a top-notch vulnerability management program
    • 05/18/2022 - Beta News -Unlocking the hidden resources that could solve the cyber skills crisis [Q&A] 
    • 05/18/2022 - Gulf Insider Bahrain (MENA) :- Tamkeen partners with SANS Institute to provide cybersecurity training
    • 05/17/2022 -  TradeArabia (MENA) - Tamkeen in deal to provide cyber security training to Bahrainis 
    • 05/16/2022 - CSO online - 12 steps to building a top-notch vulnerability management program 
    • 05/14/2022 - cyberwire - Costa Rica declares state of emergency as Conti ransomware cripples government sites
    • 05/13/2022 - BestStartup - Meet California's 101 Top Founders in the Education Space 
    • 05/13/2022 - University Business - How higher ed can pave the way for the future of the cybersecurity workforce 
    • 05/13/2022 - Heise- Security (DE) - Patch now! F5 BIG-IP systems are under active attack
    • 05/12/2022 - ASDAF News (MENA) - Keeping An Eye On Cyber Threats: SANS to Host Immersive Skills Training Program in Qatar 
    • 05/12/2022 - Computing (UK) - Threat actors exploit F5 BIG-IP vulnerability to wipe devices 
    • 05/11/2022 - TechTarget - Critical F5 vulnerability under exploitation in the wild
    • 05/11/2022 - The Hacker News - CISA Urges Organizations to Patch Actively Exploited F5 BIG-IP Vulnerability 
    • 05/11/2022 - Bleeping Computer - CISA tells federal agencies to fix actively exploited F5 BIG-IP bug 
    • 05/11/2022 - cyberwire - A new RAT, and a curious new style of exploit. Advisories from CISA and its partners
    • 05/11/2022 - Tech Radar - Major F5 exploit has been used to attack and wipe devices 
    • 05/11/2022 - Security Week - Critical Vulnerability Exploited to 'Destroy' BIG-IP Appliances
    • 05/11/2022 - IFSEC Global (UK) - The history and development of converged security  
    • 05/10/2022 - Krebs on Security - Microsoft Patch Tuesday, May 2022 Edition 
    • 05/10/2022 - Ed Tech - Universities Share Lessons Learned from Ransomware Attacks 
    • 05/10/2022 - Bleeping Computer - Critical F5 BIG-IP vulnerability exploited to wipe devices 
    • 05/09/2022 - Dark Reading - How to Check If Your F5 BIG-IP Device Is Vulnerable 
    • 05/09/2022 - Decipher - Exploits Emerge for Critical F5 Flaw 
    • 05/09/2022 - HelpNetSecurity - Attackers are attempting to exploit critical F5 BIG-IP RCE 
    • 05/09/2022 - Security Week - F5 BIG-IP in Attacker Crosshairs Following Disclosure of Critical Vulnerability 
    • 05/09/2022 - Professional Security Magazine (UK) - App threat report 
    • 05/07/2022 - Security Boulevard - Your Phone May Soon Replace Many of Your Passwords 
    • 05/07/2022 - Krebs on Security - Your Phone May Soon Replace Many of Your Passwords
    • 05/07/2022 - Bollyinside (India) - Many of your passwords may soon be replaced by your phone
    • 05/06/2022 - GovInfoSecurity - SANS Institute - Industrial Control System Resilience 
    • 05/05/2022 - Computable (BE) - Celebrate May 5... with World Password Day
    • 05/04/2022 - Cybersecurity: Amplified and Intensified - Cybersecurity Reskilling with Max Shuftan, SANS Institute
    • 05/04/2022 - Tech Business News - World Password Day 2022 Reminds the Importance of Digital Hygiene
    • 05/04/2022 - ExtraHop - SANS SOC Survey Trends Over the Past Four Years
    • 05/04/2022 - BScholarly - Best free Websites to Learn Hacking 2022: Top 10 
    • 05/03/2022 - Infopoint Security (DE) - SANS Summits: Cloud Security, Neurodiversität und ICS Security
    • 05/02/2022 - Toolbox - Looking to Boost Your Password Security Strategy? Top InfoSec Conferences You Shouldn’t Miss
    • 05/02/2022 - Defence Connect (AU)- Allectum, SME Gateway win RAAF contract to deliver sustainment office capability for the Distributed Ground Station
    • 04/30/2022 - Hardware Info (NL) - SANS report: ransomware just got faster and better
    • 04/29/2022-  Security Brief (AU) - The increasing importance of cyber threat intelligence 
    • 04/27/2002 - UK Tech News (UK) - Retailer 'The Works' targeted by cyberattacks, causing some store closures
    • 04/26/2022 - Envision RISE - Diversifying the Tech & Cybersecurity Workforce with Women of Color through Education and Training
    • 04/25/2002 - Indeed - How To Get an Online Master's Degree in Information Security in 6 Steps
    • 04/25/2002 - SmartFutures (UK) - Mind the OT cyber perception gap
    • 04/21/2022 - Industrial Cybersecurity Pulse - Cybersecurity tactics to defend your workforce 
    • 04/20/2022 - ZDNet - The 6 best ethical hacking certifications: Hone your skills 
    • 04/20/2022 - ZDNet - The 7 best cybersecurity certifications: Become a security expert 
    • 04/20/2022 - Telecom News (UK) - Expert urges everyday users to be cautious as Downing Street and Foreign Office Mobile Devices Targeted in High Profile Cyber Attack
    • 04/20/2022 - UK Tech News (UK) - Expert urges everyday users to be cautious as Downing Street and Foreign Office Mobile Devices Targeted in High Profile Cyber Attack
    • 04/19/2022 - Channel Futures (UK) - UK Government Falls Victim to Pegasus Spyware Attacks
    • 04/19/2022 - Associations Now - Five Ways to Make Your Digital Documents More Secure
    • 04/19/2022 - FederPrivacy (IT) - Information security: the control and risk requirements frameworks of the ISO 27001: 2013 standard
    • 04/19/2022 -cyberwire - The Next Evolution of Security Awareness 
    • 04/19/2022 - MarTech Series - ZeroFox Expands Threat Intelligence Capabilities with Exclusive Visibility into External Threats
    • 04/15/2022 - HelpNetSecurity - Critical Microsoft RPC runtime bug: No PoC exploit yet, but patch ASAP! (CVE-2022-26809)
    • 04/15/2022 - The New Stack - First Malware Running on AWS Lambda Discovered
    • 04/14/022 - Security Boulevard - Filling The Cybersecurity Skills Gap
    • 04/13/2022 - The Hacker MInd - Ep 44: Hackers Wanted: Filling The Cybersecurity Skills Gap
    • 04/12/2022 - Dice Insights - Threat Hunting Skills Can Boost Your Cybersecurity Career 
    • 04/12/2022 - CyberWire - Johannes Ullrich from SANS on malicious ISO files embedded in HTML
    • 04/12/2022 - CanalTech (BR) - Campanha de spam distribui praga que rouba senhas a usuários corporativos
    • 04/12/2022 - Bleeping Computer - New Meta information stealer distributed in malspam campaign
    • 04/11/2022 - HelpNetSecurity - The benefits of cyber risk quantification in the modern cybersecurity landscape 
    • 04/11/2022 - New-Tech Online (IL) - How to get on track to create innovative digital experiences
    • 04/08/2022 - IT World Canada - Cyber Security today, Week in Review for Friday, April 8, 2022
    • 04/07/2022 - Dark Reading - Mandiant to Use CrowdStrike Technology in Its Incident Response Services 
    • 04/07/2022 - Government Technology - Governor Proclaims April ‘STEM Month’ in North Carolina 
    • 04/07/2022 - IDG Connect - Secret CSO  - GIAC
    • 04/06/2022 - Khaleej Times (UAE) - SANS bridges current cybersecurity skills gap in region 
    • 04/06/2022- Flatland, Kansas City - Inside Story: Kansas, Cyber Spies, Nuclear Power and the Ukraine War
    • 04/06/2022 - HealthITSecurity - Software Vulnerabilities Point to Need for ICS Security in Healthcare 
    • 04/04/2022 - E&E News EnergyWire - War, fear, ‘hacktivist’ zeal are upending energy cybersecurity 
    • 04/04/2022 - IT World Canada - Cyber Security Today, April 4, 2022 – British teens face Lapsus$-related criminal charges, an MFA warning and updates needed for Github, Rockwell PLCs and Apple devices 
    • 04/04/2022 - SecurityWeek - Vendors Assessing Impact of Spring4Shell Vulnerability 
    • 04/04/2022 - CDO Trends (APAC) - The Security Analyst: An Expert In A Beginner’s Clothing
      • 04/02/2022 - Analytics Insight - Top 10 Ethical Hacking Certifications to Become a Security Expert 
      • 04/01/2022 - VentureBeat - Cyber Hollywood: Onscreen vs. Reality 
      • 04/01/2022 - iTNews (AU) - SANS spots Spring4shell vulnerability exploitation attempts 
      • 03/31/2022 - Philadelphia Inquirer - Hackers’ path eased as 600,000 U.S. cybersecurity jobs sit empty
      • 03/30/2022 - Bloomberg - Hackers’ Path Eased as 600,000 U.S. Cybersecurity Jobs Sit Empty 
      • 03/30/2022 - Government Technology - Fears Mount Over 600,000 Unfilled Cybersecurity Jobs 
      • 03/30/2022 - Tech Times - US Cybersecurity Needs to Fill 600,000 Positions as Country Prepares for Possible Cyberattack From Russia
      • 03/30/2022 - TechTarget - Top DevSecOps certifications and trainings 
      • 03/30/2022 - HelpNetSecurity - How to recruit cybersecurity talent from atypical backgrounds 
      • 03/30/2022 - Employee Benefit News - HBCUs are working to drive more diverse talent to cybersecurity
      • 03/30/2022 - The Blockchain Show - Can Blockchains be hacked? 
      •  03/30/2022 - Engineering & Technology (UK)  - Nearly 40 per cent of UK businesses hit by cyber attacks 
      • 03/23/2022 - The Washington Post - Experts are split on whether it's okay for Ukrainians to hack Russia 
      • 03/23/2022 - Le Monde Informatique (FR) - 6 tactiques des cybercriminels pour cacher leurs traces
      • 03/22/2022 - CXO Insight (MENA) - SANS Institute At GISEC 2022 
      • 03/22/2022 - Private Banker International (UK) - Covid-19 created a cybersecurity boom: The Ukraine crisis will see it grow
      • 03/22/2022 - Professional Security Magazine (UK) - Biden on cyber ‘critical moment’
      • 03/21/2022 - FutureEd (UK) - How schools can ease the cybersecurity talent shortage
      • 03/21/2022 - Business Daily Media (UK)  - Why businesses should invest more in their people and not cybersecurity technology 
      • 03/21/2022 - Dark Reading - Will the Biggest Clouds Win? Lessons From Google's Mandiant Buy
      • 03/21/2022 - Gulf News (MENA) - SANS Institute to spotlight interactive cybersecurity training and workforce development at GISEC 2022
      • 03/20/2022 - CISOLife - Delisha Hodo Interview - SANS Institute HBCU Chair & Senior Student Advisor
      • 03/19/2022 - Forbes Brazil (BR) - Compra da Mandiant pelo Google mostra importância da cibersegurança 
      • 03/18/2022 - The Cyberwire - Hacktivism and other cyberattacks continue against Russian targets, but some hacktivism may go too far. C2C market notes. Advice from CISA and NIST. Prank calls as statecraft
      • 03/15/2022 - IT Business Edge - Top 10 Cybersecurity Jobs for 2022 
      • 03/14/2022 - CSO Online - 8 keys to more effective vulnerability management 
      • 03/11/2022 -  Control Engineering - Cybersecurity: Introduction to ICS security fundamentals 
      • 03/10/2022 - Enterprise Networking Planet - Best Digital & Computer Forensics Tools 2022
      • 03/09/2022 - CSO Online - Responding to heightened cyberattack risk: Focus on the basics 
      • 03/08/2022 - Forbes - Google’s $5.4 Billion Acquisition Of Cybersecurity Firm Mandiant Comes As Tech Leaders Brace For Escalating Digital Threats 
      • 03/07/2022 - Dark Reading - Industrial Systems See More Vulnerabilities, Greater Threat
      • 03/07/2022 - AARP - The Best Ways to Use Digital Money Tools
      • 03/07/2022 - Lawfare - What to Make of Microsoft’s Year in Cybersecurity
      • 03/07/2022 - The Naked Scientist - Cyber in context 
      • 03/07/2022 - Medium - Certification in Cybersecurity! 
      • 03/07/2022 - RTO Insider - Cyberattacks More Likely as Russo-Ukrainian War Continues - Experts Warn Military Stalemate Could Escalate Risk 
      • 03/06/2022 - TechTarget - Top DevSecOps certifications and trainings
      • 03/04/2022 - Dark Reading - After a Busy December, Attacks on Log4j Vulnerability Dropped
      • 03/04/2022 - IT World Canada - Six quick tactics to blunt a cyber attack from Russia – or any nation state
      • 03/04/2022 - Industrial Cybersecurity Pulse - Consequence-driven ICS risk management 
      • 03/03/2022 - The Wall Street Journal - Freight Operator Expeditors Still Working to Recover From Cyberattack 
      • 03/03/2022 - Dark Reading - Cybersecurity Mesh Architecture: Hope or Hype? 
      • 03/03/2022 - Enterprise Sec Tech - Johannes Ullrich, SANS: Recognizing Fake Social Media Posts During Russia-Ukraine Conflict
      • 03/03/2022 - Wired - Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine
      • 03/03/2022 - HelpNetSecurity - The biggest threat to ICS/OT is a lack of prioritization 
      • 03/02/2022 - World Pipelines - New research reveals cyber attackers are actively targeting OT/ICS environments
      • 03/02/2022 - IT World Canada - Cyber Security Today, March 2, 2022 — Toyota and Aon deal with cyber attacks, updates on Axis and Nvidia attacks, and more
      • 03/01/2022 - Journal of Petroleum Technology - Research Finds Cyberattackers Actively Target Industrial Operations
      • 03/01/2022 - Cyberdegrees.org - Professional Spotlight: Anthony Messina GSEC, GCIH, GPEN 
      • 02/28/2022 - Forbes - Federal Agencies Have New Cybersecurity Requirements — The Private Sector Can Learn From Them, Too
      • 02/25/2022 - The Wall Street Journal - Amid Warnings of Cyberattacks in Ukraine, U.S. Companies ‘Sitting and Waiting’
      • 02/25/2022 - eSecurity Planet - SANS Outlines Critical Infrastructure Security Steps as Russia, U.S. Trade Cyberthreats
      • 02/25/2022 - Dark Reading - 7 Steps to Take Right Now to Prepare for Cyberattacks by Russia
      • 02/25/2022 - The Record by Recorded Future - Most attackers lose interest in Log4Shell 
      • 02/25/2022 - Industrial Cybersecurity Pulse - Benefits of developing a security awareness program
      • 02/24/2022 - The Seattle Times - WA companies prepare as threat of Russian cyberattacks increases 
      • 02/24/2022 - Government Technology - Cyber Attacks Are Dangerous Russian Weapon Against Ukraine
      • 02/23/2022 - The Los Angeles Times - Russia’s other dangerous weapon against Ukraine? Cyberattacks 
      • 02/23/2022 - The Stack - As Russia strikes, CISOs, security pros are fielding a lot of calls… 
      • 02/23/2022 - Security Boulevard - Developers Need Security Training
      • 02/22/2022 - The Wall Street Journal - Expeditors International Shuts Down Computer Systems After Cyberattack
      • 02/19/2022 - Politico - Despite years of preparation, Ukraine’s electric grid still an easy target for Russian hackers
      • 02/18/2022 - Industrial Cybersecurity Pulse - Three ways to engage your workforce in 2022
      • 02/17/2022 - Security Boulevard - SANS Institute: Preparing for Cyberattacks
      • 02/17/2022 - HBCU Buzz - SANS Institute Offers Two HBCU Opportunities To Learn And Win Big
      • 02/17/2022 - CyberWire - Daily Podcast Episode 1518 | 2.17.22
      • 02/16/2022 - EnterpriseSecurityTech - SANS Institute Launches First-Ever Nationwide Cybersecurity Education Scholarship for HBCU Students
      • 02/16/2022 - Security Boulevard - SANS Cyber Defense – PowerShell 2022: State of the Art / Hack / Infection
      • 02/16/2022 - Dark Reading - Where AI Falls Down in Cybersecurity 
      • 02/16/2022 - Alpha Efficiency - Web Development Certifications That Will Boost Your Reputation - GIAC
      • 02/15/2022 - The Washington Post - Russian government hackers have likely penetrated critical Ukrainian computer systems, U.S. says
      • 02/15/2022 - Dark Reading - Securonix Secures Over $1B in Growth Investment From Vista Equity
      • 02/11/2022 - Help Net Security - Apple fixes actively exploited iOS, macOS zero-day (CVE-2022-22620)
      • 02/10/2022 - Campus Technology - SANS Institute Launches Cybersecurity Scholarships for HBCU Students 
      • 02/10/2022 - InfoSecurity Magazine - SANS Institute Launches Nationwide Scholarship Program
      • 02/08/2022 - Security Boulevard - Growth of Digital Commerce Fuels 1.5x Increase in Online Fraud in 2021 
      • 02/07/2022 - Medium - Where to get Cybersecurity Training and Career Development? 
      • 02/07/2022 - IT World Canada - Cyber Security Today, Feb. 7, 2022 – Insight into a ransomware gang, email used in cyberattacks on Ukraine, and more 
      • 02/07/2022 - The Wall Street Journal - Cyber Daily: Ukraine Considers Offers for Cyber Help 
      • 02/05/2022 - TechRepublic - Cybersecurity incident response: The 6 steps to success 
      • 02/04/2022 - The Washington Post - Senators aren't swayed by Apple's security arguments
      • 02/04/2022 - Security Management - Beijing 2022 Winter Olympics Open, Amidst Boycotts and Cyber and Privacy Concerns
      • 02/03/2022 - Working Nation - Opening the diversity pathway into the cybersecurity industry 
      • 02/02/2022 - CSO Online - Packet Data Adds Increasing Value to Next-Gen Cybersecurity: SANS Institute report highlights growing trend
      • 01/31/2022 - Federal News Network - Congress wants to overhaul FISMA. Agencies are already starting to measure security differently 
      • 01/31/2022 - Datamation - 10 Top Cybersecurity Certifications
      • 01/31/2022 - SC Magazine - Wanted: mobile app pen testers 
      • 01/28/2022 - HealthITSecurity - DHS Warns of Potential Russian Cyberattacks on Critical Infrastructure
      • 01/26/2022 - Dark Reading - Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit 
      • 01/26/2022 - CyberDefense - Cybersecurity Experts Share Their Predictions for 2022 
      • 01/20/2022 - The Washington Post - Is Russia or China the biggest cyber threat? Experts are split 
      • 01/19/2022 - The State of Security - Tips for Defending Against Adversarial Actions Regardless of Their Origin
      • 01/17/2022 - Security Intelligence - What It Takes to Build the Blue Team of Tomorrow
      • 01/14/2022 - Associated Press - Cyberattack in Ukraine targets government websites 
      • 01/14/2022 - USA Today - U.S. assessing cyberattack against government websites in Ukraine
      • 01/14/2022 - MarketWatch - Ukraine assessing damage after government websites are taken offline amid cyberattack 
      • 01/14/2022 - ThreatPost - ‘Be Afraid:’ Massive Cyberattack Downs Ukrainian Gov’t Sites 
      • 01/14/2022 - IT World Canada - Firms using open source have duty to act fast when bugs are found: Apache 
      • 01/14/2022 - Security Magazine - Top 28 cybersecurity conferences of 2022
      • 01/12/2022 - Dark Reading - Check If You Have to Worry About the Latest HTTP Protocol Stack Flaw 
      • 01/12/2022 - HealthITSecurity - Critical, “Wormable” Microsoft Vulnerability Could Lead to Cyberattacks 
      • 01/12/2022 - CIO Magazine - 7 ways to breathe new life into your IT leadership career 
      • 01/12/2022 - The Daily Swig - Patch Tuesday: Web security issues in the spotlight in Microsoft’s bumper January update 
      • 01/11/2022 - esecurityplanet - Cybersecurity Employment in 2022: Solving the Skills Gap 
      • 01/11/2022 -  HealthITSecurity - Adopting Defense In Depth Strategies to Combat Healthcare Cyberattacks
      • 01/11/2022 - Security Boulevard - To Scale Your Brand Protection Think AI and Automation 
      • 01/08/2022 - CIO Review - 7 Tips and Tools to Protect University Campuses from Cyber Attacks
      • 01/07/2022 - Make Use Of - 3 Ways to Encourage People to Pursue a Career in Cybersecurity 
      • 01/05/2022 - Security Boulevard - Brand Protection Takes Priority for InfoSec Teams in 2022 
      • 01/04/2022 - Future of Business and Tech - 3 Tips for Better Cybersecurity in Your Home Office
      • 01/04/2022 - CyberWire Podcast - Log4j issues persist
      • 01/03/2022 - CSO Online - 6 ways hackers hide their tracks 
      • 01/02/2022 - Augusta Free Press - Virginia participating in CyberStart America competition 
      • 12/28/2021 - CSO Online - 4 ways employee home networks and smart devices change your threat model
      • 12/23/2021 - CPO Magazine - Preventing Wire Fraud Can Be Easy, Navigating Liability Is Much More Complicated 
      • 12/22/2021 - Washington Post - Amazon Web Services’ third outage in a month exposes a weak point in the Internet’s backbone
      • 12/22/2021 - Security Magazine - SANS holiday hack challenge adds in log4j bonus challenge
      • 12/21/2021 - Channel Insider - Best Incident Response Tools for MSPs and MSSPs in 2022
      • 12/20/2021 - CSO Online - 8 top penetration testing certifications employers value
      • 12/20/2021 - InfoSecurity Magazine - Ukrainian War Games Test Electricity Grid 
      • 12/17/2021 - The Daily Swig - Ukraine hosts large-scale simulation of cyber-attack against energy grid 
      • 12/16/2021 - Defense Media Activity - 33rd Network Warfare Squadron AFIN-SOC coordinates SANS Holiday Hack-Fest; boosts unit training and cohesion
      • 12/16/2021 - SC Magazine - Industrial cybersecurity requires unique skills. A new apprenticeship program aims to hone them
      • 12/16/2021 - Cybersecurity Dive - Security teams prepare for the years-long threat Log4j poses
      • 12/15/2021 - HelpNetSecurity - Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations 
      • 12/15/2021 - Hardcore Gamer - Jack Is Back! The Sans 2021 Holiday Hack Challenge, The Year’s Most Fun & Festive Cybersecurity Challenge, Opens To Players of All Skill Levels
      • 12/15/2021 - Industrial Cyber - Siemens Energy, SANS Institute, others align on industrial cybersecurity education 
      • 12/15/2021 -TechTarget - 'Insane' spread of Log4j exploits won't abate anytime soon
      • 12/15/2021 - IT World Canada - Cyber Security Today, Dec 15, 2021: The hunt for Log4Shell bug continues 
      • 12/15/2021 - TechBeacon - How a modern SOC can make your threat hunting smarter 
      • 12/14/2021 - Medium - Incident Response (IR) & It’s Lifecycle 
      • 12/14/2021 - Tom's Guide - Massive Log4Shell internet security flaw threatens everyone — what you can do
      • 12/14/2021 - ZD Net - US warns Log4j flaw puts hundreds of millions of devices at risk
      • 12/14/2021 - Health IT Security - Severe Apache Log4j Vulnerabilities Could Result in Healthcare Cyberattack 
      • 12/14/2021 - Security Boulevard - CVE-2021-44228 Log4Shell Detection 
      • 12/14/2021 - Krebs on Security - Microsoft Patch Tuesday, December 2021 Edition
      • 12/13/2021 - Decipher - Critical Log4j Flaw Fallout Continues 
      • 12/13/2021 -InfoSecurity Magazine - SANS Opens Free Holiday Hack Challenge
      • 12/13/2021 - MyStartUpWorld - SANS Holiday Hack Challenge now open
      • 12/13/2021 - AccessCyber - The Holidays are for Hacking 
      • 12/13/2021 - TechTarget - Why you need an email security policy and how to build one 
      • 12/13/2021 - HelpNetSecurity - Log4Shell update: Attack surface, attacks in the wild, mitigation and remediation 
      • 12/13/2021 - Security Week - Companies Respond to Log4Shell Vulnerability as Attacks Rise 
      • 12/11/2021 - IT World Canada - It could take years for applications using vulnerable version of Java log4j library to be patched, says expert 
      • 12/11/2021 - Financial Post - It could take years for applications using vulnerable version of Java log4j library to be patched, says expert
      • 12/10/2021 - Dark Reading - What to Do While Waiting for the Log4J Updates
      • 12/10/2021 - protocol - Researchers warn of a 'very, very scary' bug affecting major apps
      • 12/10/2021 - VICE / Motherboard - A Simple Exploit is Exposing the Biggest Apps on the Internet
      • 12/9/2021 - IT World Canada - Canadian firms lagging in zero trust, SASE architectures, survey suggests
      • 12/8/2021 - VICE / Motherboard - AWS Is the Internet's Biggest Single Point of Failure
      • 12/8/2021 - VentureBeat - AWS outage shines a light on hybrid cloud
      • 12/8/2021 - Dice Insights - Cybersecurity Analyst Interview Questions: 4 Prep Considerations
      • 12/6/2021 - HelpNetSecurity - RSA Conference announces initial keynote speakers to address security topics and issues for 2022  
      • 12/1/2021 - eSecurity Planet - Best Cybersecurity Awareness Training for Employees in 2022
      • 11/29/2021 - The Washington Post - Alan Paller, early leader in cybersecurity awareness, dies at 76
      • 11/26/2021 - CPO Magazine - Emotet Malware Returns by Leveraging Trickbot’s Infrastructure and Resumes Phishing Campaigns
      • 11/25/2021 - San Marcos Corridor News - Texas encourages high school students to participate in CyberStart America talent search
      • 11/24/2021 - CSO Online - Biometric Adoption is Driving a Passwordless Future
      • 11/24/2021 - Host Review - 5 Cloud Security Resources That You Should Be Using
      • 11/23/2021 - Forbes - How Tech Companies Can Help Solve The Cybersecurity Skills Shortage
      • 11/23/2021 - Security Boulevard - How to Fix Cybersecurity Recruiting
      • 11/22/2021 - Healthy Women - Is Your Health Insurance Provider Tracking You Online?
      • 11/18/2021 – Washington Technology - Cybersecurity advocate Alan Paller dead at 76
      • 11/18/2021 - The Hack Post - Debunking the Biggest Misconceptions About Purple Teaming: Ensure the Best Results
      • 11/17/2021 - The Register - Lock up your Office macros: Emotet botnet back from the dead with Trickbot links
      • 11/17/2021 - IT World Canada - Cyber Security Today, Nov. 17, 2021 – Ransomware gangs now buying zero-day vulnerabilities, a warning about vulnerable memory chips and the Emotet gang is back
      • 11/17/2021 - Bleeping Computer - Here are the new Emotet spam campaigns hitting mailboxes worldwide
      • 11/15/2021 - Central Penn Parent - Top ways to secure your family’s smart home and digital devices this holiday season
      • 11/15/2021 - The New York Times - Alan Paller, a Mover on Cybersecurity Threat, Is Dead at 76
      • 11/12/2021 - The Washington Post - The Cybersecurity 202: A newsletter briefing on cybersecurity news and policy. Chat Room. (scroll down to end)
      • 11/12/2021 -Dark Reading - In Appreciation: Alan Paller
      • 11/12/2021 - Daily Swigger - Alan Paller: Infosec World Pays Homage After SANS Founder And Infosec Luminary Dies
      • 11/12/2021 -The CyberWire - Business Briefing 11-12-21 (scroll down to Executive Moves)
      • 11/11/2021 - Federal News Network - Obituary: Alan Paller
      • 11/11/2021 - SC Magazine - Alan Paller, founder of the SANS Institute, passes away at 76
      • 11/11/2021 - Homeland Security Today - Cybersecurity Industry Titan and SANS Institute Founder Alan Paller Dies at 76
      • 11/10/2021 - Security Boulevard - Podcast | Securing Family Devices with SANS Institute 
      • 11/05/2021 - Security Magazine - Why cyber risk assessments should be a part of your business strategy 
      • 11/04/2021 - SC Magazine - Should companies subject employees to ransomware-specific security training? 
      • 11/03/2021 - Medium - Cloud Security — Best Practices for DevSec Ops. 
      • 11/01/2021 - TechBeacon - Rethink your DevSecOps: 4 key lessons for achieving security as code 
      • 11/01/2021 - Technology Decisions - Cyber Academy scholarship program for veterans
      • 11/01/2021 - Electrical Contractor Magazine - Grid Security Conference Brought Experts Together to Share Strategies 
      • 10/29/2021 - CIO Magazine - How Can CISOs Tackle the SOC Talent Shortage? 
      • 10/27/2021 - NaijaTechGuide - Top 5 Best InfoSec and Cybersecurity Certifications to Uplift your Career
      • 10/26/2021 - Enterprise Security Tech - The Hidden Cyber Threat: Secure Your Family's Smart Devices
      • 10/26/2021 - Design World - Brewing up DIY automation solutions 
      • 10/25/2021 - DefenceConnect - Allectum, SANS Institute launch Veterans Cyber Academy Scholarship for 2022
      • 10/22/2021 - Forbes - The Importance Of Measuring Security Awareness
      • 10/22/2021 - Security Magazine - Ed Skoudis named President of SANS Technology Institute
      • 10/21/2021 - IT World Canada - Don’t be tripped up by zero trust myths
      • 10/21/2021 - Legal Talk Network - The SANS Institute and Cybersecurity Careers
      • 10/21/2021 - Government Technology - USC Aiken and SANS Tech Start Cybersecurity Degree Program
      • 10/20/2021 - SC Media - Duke Health officials on security awareness: ‘Harder to tune humans than … to tune a tool’
      • 10/20/2021 - Aiken Standard - USC Aiken, SANS cyber experts join forces for new education opportunity
      • 10/19/2021 - DataQuest - Cybersecurity Awareness Month: How enterprises should approach cybersecurity
      • 10/18/2021 - IT World Canada - Ransomware payments may have totaled hundreds of millions in US, and more
      • 10/15/2021 - Washington Post - U.S. pursues a unique solution to fight hackers. It revolves around esports.
      • 10/15/2021 - Information Age - Ransomware threatens cyberinsurers
      • 10/14/2021 - Homeland Security Today - Cybersecurity Awareness Month 2021: Cyber Hygience Tips for Protecting Children and Families Online
      • 10/14/2021 - DarkReading - Digging Deep Into the Top Security Certifications
      • 10/14/2021 - Tech Gaming Report - SANS publishes a report on smartphone stability
      • 10/14/2021 - Nintendo Power - SANS publishes report on smartphone security
      • 10/13/2021 - SearchSecurity: NotPetya ransomware trend moving towards sophistication
      • 10/11/2021 - Global Banking & Finance Review - Concern
        Over Data Breaches and Frequent Cyber-Attacks are Expected to Drive the
        Hardware Security Module (HSM) Market to a Value Of US$ 6,592.5 Mn by
        2027 | TMR
      • 10/11/2021 - The Register - Gripped by cybersec career indecision? Don’t give up. Level up
      • 10/11/2021 - CSO Online - 6 ways the pandemic has triggered long-term security changes
      • 10/06/2021 - Latest Hacking News - Here’s What Caused Facebook’s Global Outage
      • 10/06/2021 - Rapid7 - Five Functions That Benefit From Cybersecurity Automation
      • 10/06/2021 - APN News: SANS Institute Introduces #Securethefamily Campaign To Help Protect Families Online
      • 10/04/2021 - ZDNet: Cybersecurity budgets for industrial control systems and operational tech increasing: SANS Institute
      • 10/04/2021 - IT World Canada: Facebook, Instagram, WhatsApp finally back online
      • 10/04/2021 - Forbes: These Three Letter Tech Acronyms Are Likely Behind Today’s Mega Outage At Facebook
      • 10/04/2021 - Channel Daily News: Facebook, Instagram, WhatsApp finally back online
      • 10/04/2021 - Bleeping Computer: Facebook, WhatsApp, and Instagram down due to DNS outage
      • 10/03/2021 - Washington Post: New emergency cyber regulations lay out ‘urgently needed’ rules for pipelines but draw mixed reviews
      • 10/01/2021 - InTheBlack: Dark web boom: How to safeguard your corporate data
      • 09/30/2021 - ComputerWorld: Edge Computing e cybersecurity: 5 best practice
      • 09/25/2021 - CyberNews: Rob T. Lee, SANS Institute: nowhere is the workforce-skills gap more pronounced than in cybersecurity
      • 09/24/2021 - ExecutiveGov: Leidos Partners With SANS Institute to Enhance Offerings at CyberEDGE Academy, Address Cybersecurity Talent Gap
      • 09/23/2021 - Technically Media: These 11 leaders were named the best in Maryland cybersecurity
      • 09/22/2021 - Utility Dive: What utility companies need to know about software bill of materials
      • 09/20/2021 - Enterprise Security Tech: Jeff Gatz, New2Cyber Curriculum Director, SANS Institute: Closing the Cybersecurity Workforce Gap
      • 09/16/2021 - Voice of CISO: SANS Institute introduces New cybersecurity Training
      • 09/14/2021 - Campus Technology: SANS Institute Launches New Training for Entry-Level Cybersecurity Roles
      • 09/12/2021- Industrial Cyber: Industrial cyber security training comes into focus in advancing threat landscape – Part II
      • 09/05/2021 - Industrial Cyber: Industrial cybersecurity training comes into focus in advancing threat landscape
      • 09/03/2021 - SC Media: Rethinking the approach to health care’s reliance on IT as security leaders
      • 09/01/2021 - VeryWell Health: 4 Ways to Prove Your COVID-19 Vaccination Status
      • 08/26/2021 - Enterprise Security Tech: Women's Equality Day 2021: Women in Cyber Are Stronger Together
      • 08/24/2021 - Dark Reading: 4 Steps Organizations Can Take to Increase Diversity in Cybersecurity
      • 08/12/2021 - MakeUseOf: What Is an Incident Response Plan?
      • 08/04/2021 - CSO: How to prepare your Windows network for a ransomware attack
      • 08/02/2021 -SearchSecurity: Improving the cybersecurity workforce with full spectrum development
      • 07/21/2021 - Campus Technology: Women's Cybersecurity Training Program Expands with Google Support
      • 07/20/2021 - ZDNet: Google, Bloomberg and Facebook pledge support for second year of Security Training Scholarship Program for women
      • 07/14/2021 - IT World Canada: Is REvil ransomware gang gone for good or just taking a vacation?
      • 07/13/2021 - Security Brief: Network security in the cloud more important than ever
      • 07/10/2021 - Security Week: Hackers Scanning for Citrix Systems Affected by Recent Vulnerabilities
      • 07/09/2021 - Enterprise Security Tech: Ryan Chapman, SANS Certified Instructor Candidate: The Implications of the Kaseya Ransomware Attack
      • 07/08/2021 - NBC News: 'Barely able to keep up': America's cyberwarriors are spread thin by attacks
      • 07/08/2021 - ZDnet: The Chris Krebs case for including election systems as critical infrastructure
      • 07/08/2021 - Government Executive: For Government Tech Workers, Certification Pays Off in Higher Salaries
      • 07/08/2021 - The WSJ: New York City Opens Cyberattack Defense Center
      • 06/28/2021 - SC Media: Ransomware: To pay or not to pay
      • 06/19/2021 - TechBeacon: Go beyond policy: 5 keys to data protection compliance
      • 06/10/2021 - CPO Magazine: What Can Brands Learn From the Facebook Data Leak?
      • 06/03/2021 -SearchSecurity: DDoS defense planning falls short
      • 05/30/2021 - The Washington Post: Colonial hack exposed government's light-touch oversight of pipeline cybersecurity
      • 05/25/2021 - My Tech Decisions: You Need To Focus On These New Cybersecurity Threats
      • 02/09/2021 - U.S.News & World Report: 10 Ways to Keep Your Cryptocurrency Safe
      • 02/04/2021 - CSO: 10 ways to kill your security career
      • 07/07/2020 - Help Net Security: Better cybersecurity hinges on understanding actual risks and addressing the right problems
      • 07/06/2020- Dark Reading: Attackers Scan for Vulnerable BIG-IP Devices After Flaw Disclosure
      • 06/23/2020 - Dark Reading: Cybercrime Infrastructure Never Really Dies
      • 06/22/2020 - CIO Dive: Technology training, certifications demand withstands pandemic slump
      • 06/18/2020 - Fox News: Sextortion is evolving during the coronavirus pandemic, report says
      • 05/26/2020 - CNN Business: Virtual cybersecurity school teaches kids to fix security flaws and hunt down hackers
      • 05/26/2021 - SearchSecurity: How to prevent firewall failures with proper testing and maintenance
      • 03/30/2020 - Dark Reading: Securing Your Remote Workforce: A Coronavirus Guide for Businesses
      • 03/20/2020 -ZDNet: Free resource to help parents keep kids safe online as schools move to eLearning
      • 03/19/2020 - infosecurity magazine: SANS Offers Free Kit to Secure Home Workers
      • 03/19/2020 - The Daily Swig: Coronavirus response: How security certification and training orgs are tackling the global disruption
      • 03/09/2020 - infosecurity magazine: SANS: Gender Still Biggest Challenge for Many Women in Cyber
      • 03/04/2020 - CSO: How to write an effective information security policy
      • 03/04/2020 - Data Center Knowledge: Palo Alto Partnership May Boost Confidence in Google Cloud’s Chronicle
      • 02/24/2020 - The Washington Post: The Cybersecurity 202: Americans should not be confident about security of 2020 election, experts say
      • 02/12/2020 - Security Boulevard: More CEOs Ditching Social Media Over Security Concerns
      • 02/03/2020 - CSO: 9 CCPA questions every CISO should be prepared to answer
      • 02/03/2020 - SearchSecurity: CISOs face a range of cybersecurity challenges in 2020
      • 01/09/2020 - CSO: Winning the war for cybersecurity talent
      • 12/20/2019 - SearchCompliance: Lack of data visibility obstructs value, storage costs and compliance
      • 12/18/2019 - dvids: For the Army and DoD there are no 'losers' at SANS NetWars
      • 12/17/2019 - CSO: Short on security expertise? You can still choose the right solutions
      • 12/04/2019 - infosecurity magazine: Festive Virtual Hacker Conference Returns
      • 11/14/1209 - infosecurity magazine: Capture the Flag Competition Aims to Trace Missing Persons
      • 11/05/2019 - CSO: 5 keys to protect your supply chain from cyberattacks
      • 10/29/2019 - Dark Reading: The Real Reasons Why the C-Suite Isn't Complying with Security
      • 10/13/2019 - CSO: The CISO’s newest responsibility: Building trust
      • 10/02/2019 - The Parallax: Harris poll backs Google plan to improve password security
      • 09/18/2019 - SearchCompliance: Protect customer data with these 5 essential steps
      • 09/03/2019 - Forbes: Teenage Hackers Wanted: Could Your Kid Be The Next £20M Cybersecurity Superhero?
      • 08/15/2019 - SearchCloudSecurity: Research shows cloud security vulnerabilities grow
      • 08/02/2019 - Forensic Focus: Interview: Lodrina Cherne, Product Manager, Cybereason
      • 07/24/2019 - Dark Reading: 7 Stats That Show What it Takes to Run a Modern SOC
      • 07/24/2019 - Data Center Knowledge: Why the WhatsApp Security Flaw Should Make Enterprise IT Nervous
      • 07/17/2019 - infosecurity magazine: 75% of Security Awareness Pros Are Part Time
      • 07/02/2019 - The Kojo Nnamdi Show: To Combat A Talent Shortage, Cybersecurity Companies Seek Diverse Candidates
      • 07/01/2019 - SC Magazine: Women in Security: Women to Watch
      • 06/28/2019 - Intelligent CIO: Editor’s Question: How important is cybersecurity education for young people for closing the cyberskills gap?
      • 06/20/2019 - California Apparel News: Retailers Take on the Fight Against Organized Crime
      • 06/18/2019 - CSO: 6 signs the CIO-CISO relationship is broken — and how to fix it
      • 06/14/2019 - SearchSecurity: SANS security awareness credential paves new career path
      • 05/18/2019 - Patch: Hartford: Winners Of The 2019 Girls Go Cyberstart Competition Honored
      • 05/03/2019 - Dark Reading: The 2019 State of Cloud Security
      • 05/03/2019 - Bank Info Security: Trump Order Aims to Boost Federal Cybersecurity Workforce
      • 04/18/2019 - Dark Reading: The Cybersecurity Automation Paradox
      • 04/10/2019 - CSO: Google expands cloud security capabilities, including simpler configuration
      • 04/09/2019 - Dark Reading: A New Approach to Application Security Testing
      • 03/27/2019 - Dark Reading: Threat Hunting 101: Not Mission Impossible for the Resource-Challenged
      • 03/19/2019 - WSJ Pro: Cyber Daily: Hope, Hype and AI; Defense Department Could Get Cyber Budget Boost
      • 03/14/2019 - SearchCompliance: AI cybersecurity benefits are real, but not automatic
      • 03/14/2019 - EnergyWire: Pentagon to utilities: Uncle Sam wants you
      • 03/11/1209 - infosecurity magazine: #RSAC: The Most Dangerous New Attack Techniques & How to Counter Them
      • 03/11/2019 - BankInfoSecurity: Why CISOs Need Partners for Security Success
      • 03/07/2019 - HealthITNews: RSA 2019: SANS shares top new security threats – and what to do about them
      • 03/07/2019 - SecurityBoulevard: RSA 2019: Day 4 Recap: Keynote Highlights, Capture the Flag, Public Interest Tech and More
      • 03/07/2019 - ITWorldCanada: Cyber Security Today - How to create corporate security awareness and a warning on nation-state attacks
      • 02/25/2019 - infosecurity magazine: W. Va. Partners with SANS to Bring Girls into Cyber
      • 02/13/2019 - CIO: 7 ways to ensure IT gets the credit it deserves
      • 01/28/2019 - SearchHRSoftware: Attackers seek gold in HR data security breaches
      • 01/02/2019 - ExecutiveGov: Gov't Launching First Employee Reskilling Academy for Cybersecurity
      • 12/20/2018 - FOX8: Genealogist urges users to take consumer DNA kits with a grain of salt
      • 12/04/2018 - Army.mil: Cyber Soldier attains 'most prestigious credential in the IT Security industry'
      • 12/03/2018 - govloop: WHITE HOUSE LAUNCHES CYBER PROGRAM FOR NON-IT FEDS
      • 11/30/2018 - fedscoop: Cybersecurity Reskilling Academy created by White House for federal employees
      • 11/30/2018 - Federal News Network: Federal Cyber Reskilling Academy to retrain federal employees as cyber defense analyst
      • 11/29/2018 - SearchSecurity: Is network traffic monitoring still relevant today?
      • 11/06/2018 - Dark Reading: Why the CISSP Remains Relevant to Cybersecurity After 28 Years
      • 10/28/2018 - Security Boulevard: Security Awareness: 5 Creative Ways to Train Employees on Cybersecurity
      • 10/22/2018 - Dark Reading: Understanding SOCs' 4 Top Deficiencies
      • 10/16/2018 - Forbes: Lance Spitzner: How To Secure The Human Operating System
      • 10/11/2018 - CSO: What is enterprise risk management? How to put cybersecurity threats into a business context
      • 10/09/2018 - CSO: 7 best practices for working with cybersecurity startups
      • 09/06/2018 - Army.mil: 'Tiger Stance' focuses on realistic, state-of-the-art cyber task force training
      • 08/28/2018 - InformationWeek: How Mid-Size Firms Can Overcome DevOps Challenges
      • 08/20/2018 - FCW: Army cyber protection teams upgrade training with a 'real' city
      • 08/16/2018 - Federal News Radio: In ‘Cybertropolis,’ Army begins to move its cyber training exercises into the physical world
      • 08/05/2018 - WSJ: U.S. Officials Push New Penalties for Hackers of Electrical Grid
      • 07/24/2018 - Maryland Department of Labor: Department of Labor EARN Maryland Program Recognized Nationally for Innovation, Effectiveness
      • 07/24/2018 - betanews: Endpoints leave industrial IoT vulnerable... Err, what's an endpoint?
      • 07/17/2018 - CSO: 5 tips for getting started with DevSecOps
      • 07/09/2018 - Dark Reading: Creating a Defensible Security Architecture
      • 06/18/2018 - Security Boulevard: Language Matters When It Comes to a Data Breach
      • 06/14/2018 - SearchSecurity: How to use the OODA loop to improve network security
      • 05/29/2018 - WSJ: The Search for Women Who Want Cybersecurity Careers
      • 05/15/2018 - Harvard Business Review: Internet Insecurity
      • 05/08/2018 - CSO: Who wants to go threat hunting?
      • 04/23/2018 - FCW: China's penetration of U.S. supply chain runs deep, says report
      • 04/19/2018 - infosecurity magazine: #RSAC: The Five Most Dangerous New Attacks According to SANS
      • 04/19/2018 - eWeek: Security Experts Warn of New Cyber-Threats to Data Stored in Cloud
      • 04/19/2018 - IT Security Guru: SANS Experts Share Five Most Dangerous New Attack Techniques
      • 04/19/2018 - CIODive: RSAC: 3 key cyberthreats to watch in 2018
      • 04/19/2018 - CSO: Two incident response phases most organizations get wrong
      • 04/19/2018 - informationsecuritybuzz: SANS Experts Share Five Most Dangerous New Attack Techniques
      • 04/18/2018 - Fifth Domain: RSA - Future cyber threats will come from inside the architecture
      • 04/13/2018 - NBC News: Jobs in cybersecurity are exploding. Why aren't women in the picture?
      • 04/05/2018 - HelpNetSecurity: What’s new at RSAC 2018?
      • 03/20/2018 - SearchSecurity: Secure DevOps: Inside the five lifecycle phases
      • 03/20/2018 - IDGConnect: Testing the waters: The value of ethical hacking for business
      • 03/01/2018 - CNN: China has found a new way to block banned words
      • 02/14/2018 - Bank Info Security: How IoT Affects the CISO's Job
      • 02/14/2018 - infosecurity magazine: Microsoft Vulnerabilities Accelerate in 2017
      • 02/04/2018 - AP News: Woman at Top of Her Game Seeks Girls With a Cyber-Aptitude
      • 01/22/2018 - CSO: Video with Rob Lee-SANS DFIR Curriculum Lead: The people you call when you've had a breach
      • 01/12/2018 - CSO: Oracle WebLogic hackers pick Monero mining over ransomware
      • 01/11/2018 - TechRepublic: How one hacker stole $226K worth of cryptocurrency from Oracle servers
      • 01/10/2018 - Dark Reading: Oracle WebLogic Exploit Used in Cryptocurrency Mining Campaign
      • 01/09/2018 - ArsTechnica: Oracle app server hack let one attacker mine $226,000 worth of cryptocoins
      • 01/08/2018 - IT World Canada: Patching Meltdown/Spectre: Take your time, or get to it fast?
      • 01/03/2018 - FE News: It's Time to Go Back to Basics to Address Cybersecurity Skills Shortages
      • 01/03/2018 - PaymentsSource: PayThink Users are compromising most security tech
      • 12/07/2017 - isBuzzNews: SANS Cybersecurity Trends And Predictions For 2018
      • 12/06/2017 - statescoop: Missouri CISO honored with national award for work in cybersecurity
      • 11/08/2017 - Defense Systems: Army pushes recruiting and retaining cyber talent
      • 10/17/2017 - FCW: IRS pushes back on data protection criticisms
      • 10/13/2017 - Dark Reading: Getting the Most Out of Cyber Threat Intelligence
      • 10/10/2017 - SearchSecurity: Considerations for developing a cyber threat intelligence team
      • 10/02/2017 - SearchSecurity: Is data-centric security worth the implementation challenge?
      • 09/06/2017 - information age: What is the biggest threat to data? Ransomware of course
      • 08/18/2017 - The Manufacturer - UK: Cyber security in industrial control systems
      • 08/17/2017 - SearchSecurity Germany: ICS: Industrielle Steuerungsanlagen als Ziel von Ransomware
      • 08/15/2017 - Search Security: Security Teams Must Embrace DevOps Practices or Get Left Behind
      • 08/09/2017 - FCW: Can the U.S. Stop Malware and Buy it at the Same Time?
      • 08/01/2017 - Data Center Knowledge: What Europe's New Data Protection Law Means for Data Center Operators
      • 07/26/2017 - Dark Reading: Adobe's Move to Kill Flash Is Good for Security
      • 07/27/2017 - SearchSecurity: What tools were used to hide fileless malware in server memory?
      • 07/18/2017 - Dark Reading: SIEM Training Needs a Better Focus on the Human Factor
      • 07/11/2017 - SecurityWeek: ICS Security Pros Increasingly Concerned About Ransomware: Survey
      • 07/06/2017 - eSecurity Planet: How Not to Handle Incident Response: Automobile Association Exposes 117,000 Customers' Data
      • 06/27/2017 - Threatpost: Complex Petya-Like Ransomware Outbreak Worse Than Wannacry
      • 06/26/2017 - The Verge: Alexa's new calling feature means it's really time to set up two-factor authentication
      • 06/21/2017 - CIO Insight: Security Awareness Programs Need Full-Time Staff
      • 06/12/2017 - The Washington Post: Russia has developed a cyberweapon that can disrupt power grids, according to new research
      • 06/06/2017 - SearchSecurity: How mobile application assessments can boost enterprise security
      • 06/02/2017 - Dark Reading: How to Succeed at Incident Response Metrics
      • 06/02/2017 - Computerworld: The top 5 mobile security threats
      • 05/30/2017 - Dark Reading: Securing the Human a Full-Time Commitment
      • 05/27/2017 - ZDNet: New awareness study reveals what you need for the best security programs
      • 05/24/2017 - CSO: Few firms will be ready for new European breach disclosure rules, fines
      • 05/22/2017 - CSO: Companies Ramp Up Recruiting Veterans as Cybersecurity Urgency Grows
      • 05/03/2017 - DarkReading: 7 Steps to Fight Ransomware
      • 04/26/2017 - CSIS Report: IoT, Automation, Autonomy, and Megacities in 2025
      • 03/15/2017 - NBC Today: US infrastructure is at ‘red alert’ for hacking, expert says
      • 03/13/2017 - Dark Reading: What Your SecOps Team Can (and Should) Do
      • 03/07/2017 - Austin Business Journal: 5 reasons Austin businesses should hire 'good' hackers
      • 03/01/2017 - Signal: Girding the Grid For Cyber Attacks
      • 02/16/2017 - eweek: Ransomware Heads List of 7 Most Dangerous New Cyber-Attack Techniques
      • 02/15/2017 - ZDNet: The seven most dangerous attack techniques: A SANS Institute rundown
      • 02/15/2017 - PCWorld: The 7 security threats to technology that scare experts the most
      • 01/31/2017 - Padtronics: Are IoT Devices Putting Your Organization at Risk?
      • 01/27/2017 - CSO: Compliance focus, too much security expertise hurts awareness programs
      • 01/26/2017 - Dark Reading: How I Would Hack Your Network (If I Woke Up Evil)
      • 01/24/2017 - The Agenda: Confronting Cyber Conflict: Video with Robert M. Lee
      • 01/23/2017 - WSJ: Yahoo Faces SEC Probe Over Data Breaches
      • 01/11/2017 - Dark Reading: The 3 C's Of Security Awareness
      • 01/04/2017 - gtm: The Real Cybersecurity Issues Behind the Overhyped ‘Russia Hacks the Grid’ Story
      • 12/21/2016 - CBS News: Video: Russian hacks into Ukraine power grids may be a sign of things to come
      • 11/29/2016 - WSJ: Attack Crashes Nearly 1M Deutsche Telekom Internet Routers
      • 11/28/2016 - Wired: SF’s Transit Hack Could’ve Been Way Worse—And Cities Must Prepare
      • 11/28/2016 - Dark Reading: Time For Security & Privacy To Come Out Of Their Silos
      • 11/01/2016 - SearchSecurity: Want a board-level cybersecurity expert? They're hard to find
      • 11/01/2016 - Dark Reading: Why Enterprise Security Teams Must Grow Their Mac Skills
      • 10/27/2016 - Dark Reading: How To Build A Strong Security Awareness Program
      • 10/27/2016 - Forensic Focus: Malware Can Hide, But It Must Run
      • 10/19/2017 - CSO: Cybersecurity 'ninjas' value challenges, training and flexible schedules over pay
      • 10/10/2016 - HealthITSecurity: Reviewing File Transfer Protocol Healthcare Cybersecurity Risks
      • 10/06/2016 - CSO: Evolving risks and business technologies shift focus in security budgets
      • 09/19/2016 - CSO: Performance, management and privacy issues stymie SSL inspections, and the bad guys know it
      • 09/15/2016 - CSO: Awareness training: How much is too much?
      • 08/15/2016 - eSecurity Planet: How to Mitigate Fourth-Party Security Risks
      • 08/11/2016 - fedscoop: EPA releases limited summary of cybersecurity report
      • 08/11/2016 - fedscoop: Interior falls short in logical access control standards - report
      • 08/01/2016 - The Parallax: How to Send Money Securely
      • 07/29/2016 - MotherBoard: What Are the Risks of Hacking Infrastructure? Nobody Really Knows
      • 07/28/2016 - SearchSecurity: How InfoSec professionals can improve their careers through writing
      • 07/26/2016 - SANS State of App Sec report: It's not just about dev teams
      • 07/21/2016 - Energy Wire: Utilities look back to the future for hands-on cyberdefense
      • 07/20/2016 - EnergyWire: Grid hack exposes troubling security gaps for local utilities
      • 07/14/2016 - fedscoop: Survey: Health industry cyber pros moving beyond compliance
      • 07/12/2016 - fedscoop: 'We're lucky someone wasn't killed: A look at the patent office's Christmas outage
      • 07/08/2016 - Network World: Confusion over cyber insurance leads to coverage gaps
      • 06/27/2016 - Cybernance: Who'll Be the Gap Closer in Cyber Insurance?
      • 06/22/2016 - CSO: Concerns about security, information sharing up among industrial control system security pros
      • 06/22/2016 - SecurityWeek: ICS Security Not Improving, Despite More Attacks
      • 06/20/2016 - The Cybersecurity Podcast: Hackers Infiltrated Ukraine's Power Grid. What's Next? With Rob M. Lee
      • 06/10/2016 - Security Intelligence: The Evolving State of the Mobile Endpoint
      • 06/07/2016 - energy central: How to build NERC CIP compliance: a new course by the SANS Institute
      • 06/03/2016 - Archer Energy Solutions: Secret malware targets critical systems that move your world
      • 05/24/2016 - the energy connective: What Utilities Are Still Learning About the Ukraine Cyberattacks
      • 05/13/2016 - CSM Passcode: Hard lessons for Energy Dept., power sector after Ukraine hack (+video)
      • 05/05/2016 - TechRebublic: LAPD hacks iPhone 5s, proves they don't need Apple backdoor
      • 04/29/2016 - TechRepublic: Cyber threat hunting: How this vulnerability detection strategy gives analysts an edge
      • 04/08/2016 - CSO: Consider the Panama Papers breach a warning
      • 03/30/2016 - TechRepublic: Apple demands to know how FBI cracked San Bernardino iPhone
      • 03/28/2016 - Forbes: Calling All Women: The Cybersecurity Field Needs You And There's A Million Jobs Waiting
      • 03/23/2016 - Forbes: Meet The Ex-Army Hackers Trying To Save America From Blackouts
      • 03/15/2016 - FCW: Why Mobile Data Security Matters
      • 03/13/2016 - WSJ: Cybersecurity Training, Military Style
      • 03/11/2016 - Bloomberg: In the Age of Cybercrime, the Best Insurance May Be Analog
      • 03/10/2016 - FP: With Power Plants Getting Hacked, Senate Looks For Ways To Keep The Lights On
      • 03/09/2016 - ComputerWorld: Experts warn that 'chip off' plan to access terrorist's iPhone is risky
      • 03/03/2016 - TechBeacon: 5 emerging security technologies set to level the battlefield
      • 03/03/2016 - CSO: Cybersecurity no longer merger afterthought
      • 03/03/2016 - Dark Reading: 7 Attack Trends Making Security Pros Sweat
      • 03/08/2016 - ZDNet: Why the connected car is one of this generation's biggest security risks
      • 02/29/2016 - New York Times: Utilities Cautioned About Potential for a Cyberattack After Ukraine’s
      • 02/29/2016 - Baseline: IT Security Teams Are Stretched to the Limit
      • 02/29/2016 - BBC: Ukraine cyber-attacks 'could happen to UK'
      • 02/24/2016 - Security Insider: Ausbildung und Zertifizierung von IT-Security-Experten
      • 02/21/2016 - Computerwoche: Wie Ihr Security-Training erfolgreich wird
      • 02/16/2016 - Marketplace: Hacking competitions burnish cybersecurity resume
      • 02/02/2016 - channelinsider: 12 Key Facts About the True Costs of Data Breaches
      • 01/28/2016 - SECTANK: Windows 10 liefert mit 'Credential Guard' wichtige Sicherheitsfeatures
      • 01/27/2016 - ItBusinessEdge: Why Mobile Apps Are Not Getting More Secure
      • 01/26/2016 - CSO: Preparation lowers long-term post-breach costs
      • 01/21/2016 - CNN: Hackers could secretly tap into corporate meetings
      • 01/21/2016 - CSO: How much at risk is the U.S.'s critical infrastructure?
      • 01/20/2016 - fedscoop: Interior Department FISMA audit reveals shortcomings in emergency planning
      • 01/20/2016 - Wired: Everything We Know About Ukraine's Power Plant Hack
      • 01/19/2016 - ITBusinessEdge: The IoT, IPv6 and DDoS: A Dangerous Mix
      • 01/18/2016 - CNN: Scary questions in Ukraine energy grid hack
      • 01/08/2016 - Foreign Policy: Did Russia Knock Out Ukraine's Power Grid?
      • 01/05/2016 - The Washington Post: Russian hackers suspected in attack that blacked out parts of Ukraine
      • 01/04/2016 - Motherboard: Malware Found Inside Downed Ukrainian Grid Management Points to Cyberattack
      • 01/04/2016 - Forbes: 30 under 30 in Enterprise Technology: Robert M. Lee
      • 01/02/2016 - Security Insider: Wie lief der Angriff auf das Stromnetz der Ukraine?
      • 12/21/2015 - The Dallas Morning News: Breach of power: Foreign hackers prove capable of crippling U.S. electric grid
      • 12/14/2015 - datensicherheit.de: Smartphone-Forensik: Interessantes Feld für Cyber-Untersuchungen
      • 11/27/2015 - TechRepublic: SSH getting a security tune-up from NIST and IETF
      • 11/20/2015 - Dark Reading: Introducing 'RITA' for Real Intelligence Threat Analysis
      • 11/17/2015 - CSO: Closing the cybersecurity talent gap, one woman at a time
      • 11/17/2015 - eWeek: Businesses Lack Resources to Defend Against Cyber-Attacks
      • 11/12/2015 - CSO: Is the board's involvement in cybersecurity really that critical?
      • 11/11/2015 - ITPRO: Parking fine clerk graduates as world-leading cybersecurity talent
      • 11/01/2015 - CBS News: In the dark over power grid security with Larry Pesce, SANS Instructor
      • 10/06/2016 - infosecurity: To Stop APTs You Need Anticipatory Active Defenses
      • 10/06/2015 - SearchSecurity: How to perform a forensic acquisition of a virtual machine disk
      • 09/24/2015 - TechRepublic: The Windows 10 privacy debacle: Five big issues to consider
      • 09/11/2015 - Dark Reading: The Truth About DLP & SIEM: It’s A Process Not A Product
      • 09/08/2015 - WSJ: Phishing Schemes Target IT Workers at Critical Infrastructure Companies
      • 09/24/2015 - Campus Technology: Data Security in Higher Ed – A Moving Target
      • 08/19/2015 - CSO: CISOs facing boards need better business, communication skills
      • 08/04/2015 - TechTarget: Enterprise IoT Security: Is the sky truly falling?
      • 07/31/2015 - CSO: Neiman Marcus case a reminder to check your cyber coverage
      • 07/31/2015 - infosecurity: SANS Announces Recruitment Fair for Top Infosec Candidates
      • 05/08/2015 - IT Administrator: Penetration Tests in drahtlosen Umgebungen
      • 07/20/2015 - Dark Reading: How I Learned To Love Active Defense
      • 07/16/2015 - CSO: Regulators seek to limit security software exports
      • 06/08/2015 - SearchCloudSecurity: Using a VMware firewall as part of a defense-in-depth strategy
      • 07/16/2015 - CSO: Electronic Frontier Foundation celebrates 25 years of defending online privacy
      • 07/17/2015 - IT-Director: Riskante Penetrationstests
      • 06/22/2015 - Military Times: Cybersecurity degrees are job magnet
      • 06/19/2015 - infosecurity: SANS Cyberskills Self-Assessment Addresses Skills Shortage
      • 06/16/2015 - CNN: FBI investigating whether Cardinals Hacked Astros
      • 06/08/2015 - SNL: Experts warn utilities to watch for cyberattacks via substation break-ins
      • 05/20/2015 - IT Job Magazin: SANS Institut bildet weltweit Cyber-Spezialisten aus
      • 06/06/2015 - CNN Video: Rob Lee Discusses the OPM.GOV Hack
      • 06/03/2015 - CNN: Mac attack! Nasty bug lets hackers into Apple computers
      • 06/02/2015 - NetworkWorld: Experts divided on security implications of DOJ's deal with Box
      • 05/12/2015 - Smart Grid Today: SECURITY EXPERTS: Utility IT, OT still miles apart
      • 05/06/2015 - Medical Product Outsourcing: Device Insecurity
      • 04/26/2015 - CBS News Video: Strengthening the nation's defense against hackers
      • 04/28/2015 - infosecurity: DDoS, Lizard Squad and Preparing for Cyber-War
      • 04/27/2015 - Motherboard: Did Iran Launch a Cyberattack Against the US? Probably Not, New Report Says
      • 04/23/2015 - Dark Reading: 6 Most Dangerous New Attack Techniques in 2015
      • 04/22/2015 - TheDailyDot: Security companies accused of exaggerating Iran's cyberthreats against the U.S.
      • 04/20/2015 - Security Insider: Traumjob Pen Tester : Mit ‚kriminellem‘ Gespür Sicherheit schaffen
      • 04/17/2015 - threatpost: Active DoS Exploits for MS15-034 Under Way
      • 04/16/2015 - Computerworld: Experts boost threat level, call for patching critical Windows bug ASAP
      • 04/16/2015 - DarkReading: Microsoft Zero-Day Bug Being Exploited In The Wild
      • 04/16/2015 - threatpost: Ransomware Teslacrypt Still Targeting Gamers
      • 04/15/2015 - IT Security Guru: SANS launches Cyber Academy to train cyber skills in eight weeks
      • 04/15/2015 - SECTANK: Perspektiven in der Sicherheitsberatung (III) – Trainings: „Qualität hat ihren Preis“
      • 04/09/2015 - MicroScope: Lack of soft skills harming security awareness programmes
      • 04/01/2015 - SearchSecurity: New cyberthreats: Defending against the digital invasion
      • 04/01/2015 -  CSMonitor: Obama's cyber sanctions order adds punch to fight against foreign hackers (+video)
      • 04/01/2015 - SecurityInsider: Internet Storm Center sucht Anomalien im Web Traffic
      • 03/25/2015 - SearchSecurity: Using NIST 800-125-A to understand hypervisor security threats
      • 03/23/2015 - CBC News: CyberCity: Model town on front line of digital terrorism
      • 03/19/2015 - Today Show Video (w/ SANS Instructor James Lyne) – Are free Wi-Fi hotspots secure?
      • 03/15/2015 - ComputerWorld Artikel: Industriekontrollsysteme ausser Kontrolle
      • 03/14/2015 - Washington Post: As governor, Jeb Bush used e-mail to discuss security, troop deployments
      • 03/10/2015 - Business Insider: Experts are skeptical that Hillary Clinton's 'homebrew' email server could withstand cyberattacks
      • 03/09/2015 - threatpost: New Technique Complicates Mutex Malware Analysis
      • 03/07/2015 - The Daily Beast: Hillary's Secret Email Was a Cyberspy's Dream Weapon
      • 02/13/2015 - Computerworld: Partly cloudy with a chance of hacking?
      • 02/13/2015 - SecurityWeek: Netatmo Weather Stations Expose Wi-Fi Passwords: Researcher
      • 02/07/2015 - New York Times: Data Breach at Anthem May Lead to Others
      • 01/27/2015 - SearchCloudSecurity: Implementing VMware border router ingress and egress filtering
      • 01/21/2015 - U.S. News & World Report: Choose the Right Online IT Training
      • 01/21/2015 -TheDailyDot: Hospitals prepare for the fight against hackers
      • 01/20/2015 -WSJ: CIOs Eye Obama Cybersecurity Push with 'High Level of Interest'
      • 01/13/2015 - CSO: Obama proposes new 30-day data breach notification law
      • 12/23/2014 - USA Today: Key industries train to thwart cyber attacks
      • 12/18/2014 - realtimes: what lies in wait: security threats in 2015
      • 12/22/2014 - CSO: 5 lessons to help security pros craft a New Year's resolution
      • 12/08/2014 - SearchCloudSecurity: Understanding VMware ESXi hypervisor security features
      • 12/10/2014 -CSO: Why the board of directors will go off on security in 2015
      • infosecurity: SANS Warns of Shellshock Attacks on NAS Kit
      • SearchSecurity: Using secure network tiers to bolster network security rules
      • WSJ: CIOs and CISOs Can Learn From the Massive Sony Data Breach
      • infosecurity: Cyber-Security SANS Frontières: An Interview with Lance Spitzner
      • NetworkWorld: 5 ways to escape password hell
      • SearchSecurity: Using crypto-free zones to thwart advanced attacks
      • Forbes: America's Critical Infrastructure Is Vulnerable To Cyber Attacks
      • SearchSecurity: Operational challenges as cybersecurity gets sensored
      • CSO: Apple's iWorm fix still leaves major hole
      • CU Info Security: White House Hack: A Lesson Learned
      • Forbes: Operational Resilience - Not Just Technology Security - Drives Competitive Advantage
      • WSJ: Sabotage Investigation Highlights Poor Network Monitoring at Utilities
      • CSO: Did researchers help hackers in releasing USB drive exploit?
      • CSO: Three scary, but true, security tales
      • Ars Technica: Shellshock fixes beget another round of patches as attacks mount
      • CSO: Six key defenses against Shellshock attacks
      • SearchSecurity: Attackers already targeting Bash security vulnerability
      • HealthCare Info Security: Ramping Up Medical Device Cybersecurity
      • SearchSecurity: How to build complex passwords and avoid easy breaches
      • CSO: Why retailers like Home Depot get hacked
      • SearchSecurity: The case for NAC-based continuous monitoring for attack detection
      • InformationWeek: HealthCare.gov Breach: The Ripple Effect
      • SearchSecurity: Apple two-factor authentication fail leaves iCloud users vulnerable
      • Bloomberg TV: Is This How Jennifer Lawrence Got Hacked
      • SearchCloudSecurity: Following iCloud hack, experts say enterprise data likely at risk
      • Dice: 4 Interview Qs for Network Penetration Testers
      • HealthCare Info Security: Breach Response: Are We Doing Enough?
      • DevOps: Internet of Things (IoT) poses challenges for DevOps and security
      • Security that works: Three must-have enterprise security fundamentals
      • ZDNet: In wake of hacks, incident response efforts weak in enterprise
      • Government Technology: Crooks are Winning Cyber War, Experts Say
      • IT World Canada: SQL injection attacks can be stopped, says security expert
      • CSO: Defensive tactics against sophisticated cyberspies
      • Associated Press: T1red of p@sswords? Y0u @re N*t @lone!
      • CSO: Today's top skill sets in security -- and why they're in demand
      • Dark Reading: Security Pro File: Spam-Inspired Journey From Physics To Security
      • Dark Reading: New OpenSSL Flaw Exposes SSL To Man-In-The-Middle Attack
      • NetworkWorld: New OpenSSL vulnerability called not as serious as Heartbleed
      • BizTech: Q&A: A Word With Security Expert John Pescatore
      • eWeek: Health Care Sector Faces Rising Pressure to Bolster Data Security
      • CNBC: Cyberwarfare: Protecting 'soft underbelly' of USA
      • Careers Info Security: Why InfoSec Pay Shows Lackluster Gains
      • SearchSecurity: John Pescatore: Evasion techniques aiding advanced targeted attacks
      • CSO: Open campus, security nightmare
      • CSO: A security awareness short list from SANS
      • SearchSecurity: John Pescatore: BYOIT, IoT among top information security trends
      • infosecurity: Infosecurity Europe 2014: Worst Security Threats go Undetected, Warns Dr Eric Cole
      • CSO: In a world of complexity, focus on the basics
      • ComputerWeekly: Cyber threat detection paramount, says SANS fellow
      • SearchSecurity: Good information security leadership demands focus on shared knowledge
      • CSO: Tech titan funding just a start in securing critical open-source projects
      • FederalNewsRadio: Listen to Interview with Alan Paller on Heartbleed
      • Security Bistro: What’s Needed Now: Supply Chain Integrity Testing
      • PC Advisor: Think tank challenges Heartbleed handwringing
      • CSO: Here are the options with Heartbleed-flawed networking gear (Hint: there aren't many)
      • infosecurity: SANS’ Eric Cole Gets Infosecurity Europe Hall of Fame Nod
      • Bloomberg: NSA Said to Exploit Heartbleed Bug for Intelligence for Years
      • SearchSecurity: 'Heartbleed' OpenSSL vulnerability: A slow-motion train wreck
      • Forbes: Avoiding Heartbleed Hype, What To Do To Stay Safe
      • ZDNet: Businesses need to inform users about Heartbleed exposure
      • The Register: Not just websites hit by OpenSSL's Heartbleed – your PC and phone may be in peril too
      • ZDNet: Smart malware campaign attacks only Android
      • FierceCIO: Rise of the CSO: a CIO's power threat or job savior?
      • CSO Magazine: Info sec industry still struggles to attract women
      • WSJ: How Utilities Can Shore up Windows XP Security
      • CIO Insight: The Complicated Relationship Between CIOs and CSOs
      • InfoWorld: A clear-eyed guide to Mac OS X's actual security risks
      • Network World: Focus on fundamentals to reduce data breaches, expert advises
      • CSO Magazine: CyberLocker's success will fuel future copycats
      • Signal Magazine: Resolving the Critical Infrastructure Cybersecurity Puzzle
      • CSO Magazine: SANS seeks feedback in salary survey
      • SC Magazine: RSA 2014: Experts discuss the most dangerous new attack techniques
      • Security Week: Linksys Router Worm Spreading
      • Forbes: New Cyberthreat Report By SANS Institute Delivers Chilling Warning To Healthcare Industry
      • Healthcare Info Security: Study: Endpoint Vulnerabilities Common
      • WSJ: Medical Devices Can Lead to Breaches
      • Energy.Gov: Securing the Nation’s Grid
      • SearchSecurity: Cyberthreats: Know thy enemy in 2014
      • Washington Post: Senate cybersecurity report finds agencies often fail to take basic preventive measures
      • NY Post: Yahoo e-mail customers’ names, passwords stolen
      • SC Magazine: Attacker extorts coveted Twitter username in elaborate social engineering scheme
      • FCW: Is cybersecurity the right job for you?
      • Security Week: Cyber Attack Leverages Internet of Things
      • Design News: Fuzzing Framework Fights Control Hackers
      • Federal News Radio: Target Breach interview with Johannes Ullrich
      • Careers Info Security: Top 10 InfoSec Careers Influencers
      • CSO Magazine: Rising impact of Target breach indicates deeper hack into systems
      • CBC News: Snapchat hack shows vulnerable side of smartphone apps
      • threatpost: Probes Against Linksys Backdoor Port Surging
      • Nextgov: The Ten Worst Hacks of 2013
      • Nextgov: Awards Recognize Best in Government Cybersecurity
      • Security Week: Alleged NSA Payment to RSA Raises New Fears of Gov't Undermining Crypto Security
      • Network World: Take the 10th annual SANS Institute Holiday Hacking Challenge
      • CSMonitor: Target data theft: worrying sign of cyber thieves' sophistication
      • threatpost: Facebook Phishing Campaign Employing Malicious Tumblr Pages
      • ComputerWorld: 300 victims report fake support calls to security org
      • Nextgov: Master's Accreditation Benefits Federal Cyber Pros
      • Course Review: SANS SEC 760 Advanced Exploit Development for Penetration Testers
      • CSO Magazine: Can we use Big Data to stop healthcare hacks?
      • internet evolution: IT Security Pros Click Into CyberWar
      • SC Magazine: The coming Internet of Things
      • Nextgov: Cybersecurity Experts Will Face Off in Mock NetWars
      • WSJ: U.S. Gives Companies Cybersecurity Guidelines to Protect Critical Infrastructure
      • HealthITSecurity: CISO focuses on compliance, collaboration for SANS summit
      • Federal News Radio: DHS, SANS Institute join forces to give agencies cyber primer
      • NetworkWorld: New GIAC certification advances industrial cyber security
      • Certification Magazine: New GIAC cert aimed at protecting industry and infrastructure
      • CSO Magazine: What the Internet of Things means for security
      • Security Bistro: The Global Industrial Cyber Security Professional Certification (GICSP) is Launching in November
      • NBC News: Cyber defenders are in short supply as hacking wars escalate
      • Control Engineering: Cyber security experiment reveals threats to industrial systems
      • eWeek: Cyber-Security in 2013: Software, People Still Have Vulnerabilities
      • ComputerWorld: Shutdown could delay government's patching of IE, Windows and .NET flaws
      • ComputerWorld: Adobe hack shows subscription software vendors lucrative targets
      • TechRepublic: Researchers reverse-engineer the Dropbox client: What it means
      • MIT Technology Review: Dropbox and Similar Services Can Sync Malware
      • CSO Magazine: CSOs: Stop flogging the threats and start providing solutions
      • Business News Daily: Here Comes Windows 8.1 — Should You Upgrade?
      • FCW: Why .gov went dark
      • Infosecurity: Former DHS Secretary Launches Council on Cybersecurity
      • Infosecurity: SANS: Internet of Things Must Drive Fresh Security Approaches
      • Security Bistro: Thinking About How to Secure the Internet of Things (IoT)
      • How to make a bazillion dollars in 2014 from Windows XP
      • HealthITSecurity: Engaging users to augment healthcare security training
      • Course Review: SANS SEC573 Python for Penetration Testers
      • NPR: U.S. Worries NSA Leaker's Files Could Be Hacked
      • So, You Wanna Be a Penetration Tester?
      • CSO Magazine: 5 questions with Alissa Torres, SANS Instructor and Incident Handler at Mandiant
      • WSJ: The Morning Download: Gas Industry Lobbies Against Cyber Standards
      • NetworkWorld: Security analytics will be the next big thing in IT security
      • CyberCity: Training Ground For The Navy SEALs Of Online Defense
      • CNN: America's next threat: Cyberterrorism?
      • Ecommerce Times: Market Jitters Hint at Social Hacks' High Threat Level
      • CSO Magazine: Social engineering in penetration tests: 6 tips for ethical (and legal) use
      • TechTarget: Trusted platform module aids Windows mobile device security
      • Nextgov: New Tool Can Help Agencies Assess Cyber Skills
      • AutomationWorld: An Education in Cyber Security
      • Government Technology: Colorado Embraces New IT Security Philosophy
      • New York Times: Luring Young Web Warriors Is a Priority. It’s Also a Game.
      • NetworkWorld: New course teaches techniques for detecting the most sophisticated malware in RAM only
      • Cybersecurity's Skills Deficiency: Paller: 'There's No Pipeline' of Deep-Knowledge Pros
      • InformationWeek: China Hack Attacks: Play Offense Or Defense?
      • SearchSecurity: Emerging threats include kinetic attack, offensive forensics: RSA 2013
      • CRN: 5 Most Dangerous New Hacking Techniques
      • Control Engineering: Michael Assante and Tim Conway offer security suggestions for plant operators
      • Bank Info Security: CISOs Building Credibility
      • New York Times: Some Victims of Online Hacking Edge Into the Light
      • CSO: How Colorado's CISO is revamping the state's information security -- on a $6,000 budget
      • Fox News: Cyber Experts Needed, But There's a Skills Gap
      • LA Times: Hackers target Western news organizations in China
      • NBC News: Cyber watchdogs worry about worker shortage
      • 3 terrifying, but true, security tales
      • 4 Ways to Spot an Internet Scam
      • A Tiny City Built To Be Destroyed By Cyber Terrorists, So Real Cities Know What’s Coming
      • AirForceTimes: Cybersecurity personnel to have new mission
      • Businessweek: The Battle to Protect Confidential Data
      • BYOD offers tricks and treats for enterprises, say analysts
      • CIO: SANS NetWars tests cybersecurity pros against peers
      • CNN: Scammers create fake donation websites for Sandy victims
      • Comprehensive Cybersecurity: Securing the Human Operating System
      • Course Review: SANS FOR408 Computer Forensic Investigations – Windows In-Depth
      • CSO: It's time to start patching the Human OS
      • Dark Reading: ‘CyberCity’ Faces Its First Attacks Next Month
      • Dice: Did Fried Brain Cells Bag John McAfee?
      • Forbes: The Cloud's Not-So-Secret Weak Link
      • Forensics: When is Data Truly Lost?
      • GCN: NetWars helps develop the future of cybersecurity
      • Hackers claim 12 million Apple IDs from FBI
      • InfoWorld: Eric Cole: Interview with a remarkable security guru
      • Inside a Forensics Investigation
      • IT Security Police: 'Step Away From That IE'
      • NetWars Tournament of Champions Tests the Skills of the Nation’s Top Cyber Security Practitioners
      • NetworkWorld: Want to develop cybersecurity skills? Try SANS Institute's NetWars
      • New Cyber Group Aims To Spread Basic Security
      • Potential for Sandy scams prompts warnings
      • SearchSecurity: Custom, targeted malware attacks demand new malware defense approach
      • SearchSecurity: NetWars CyberCity missions to improve critical infrastructure protection
      • Tool Scans for RTF Files Spreading Malware in Targeted Attacks
      • Washington Post: CyberCity allows government hackers to train for attacks
      • Whitelisting Traffic: A practical Exercise for Network Defenders
      • SANS CyberCon 2012: It's A Secret
      • Forbes: Spammers Are Using Facebook To Impersonate Your Friends
      • NY Post: White-hat cyberbug bounty nets cash
      • CIO: How to Secure Data by Addressing the Human Element
      • Lack of Cyber Career Paths and Training Standards Stymies Security
      • Google Switches On Browser Spy Cam in Chrome
      • Microsoft provides workarounds for Oracle vulnerability
      • DNS Changer: Cyber Criminals, Internet Access And The FBI
      • Washington Post: Cybersecurity chief urges action by Congress
      • DNSChanger apocalypse: Like Y2K, but even snoozier
      • CSO: Alan Paller on cutting through the bull
      • DNS Changer virus threat passes; no significant outages
      • Thousands risk Internet shutdown as U.S. fix expires
      • Botnet infections in the enterprise have experts advocating less automation
      • FBI Could Shut Off Servers
      • The AC/DC lesson: Why IPv4 will be with us a long time
      • Best practices for data encryption, Part 1
      • SANS Digital Forensics and Incident Response Summit
      • SearchSecurity: Password database inventory required following LinkedIn breach
      • InfoWeek: LinkedIn Password Breach: 9 Facts Key To Lawsuit
      • CSO: Advanced persistent threats can be beaten, says expert
      • Understanding and defeating APT, Part 2: Fighting the 'forever war' against implacable foes
      • Understanding and defeating APT, Part 1: Waking up to the who and why behind APT
      • How Ethical Hackers Make Computers Safer
      • SearchSecurity: Kaspersky Flame malware poses little threat to businesses
      • NetworkWorld: New approaches to combat 'sources of evil' and other security issues
      • Old remedies don’t work on new threats; SANS panel will discuss alternative medicine
      • Despite increased infosec spending, breaches and frustration are on the rise
      • 3 Incident Response Essentials with Rob Lee
      • Interview with Ed Skoudis: SANS Cyber Guardians hack to help America win the cyberwar
      • Interview with SANS' Ed Skoudis: America losing the cybersecurity war to hackers
      • Vermont Tech student takes first place in computer skills tournament
      • Pitting Education Against Cyber Attacks
      • CIO: Mobile Malware: Beware Drive-by Downloads on Your Smartphone
      • SC Magazine: The six most dangerous infosec attacks
      • Ed Skoudis: RSA Conference Flash Talks 2012
      • Air Force aims to turn cyber into a career
      • SC Magazine: SANS builds digital certificate checker
      • The 10 Biggest Online Security Myths - And How to Avoid Them
      • CIO: How to Make Time for Continuing Education and Career Development
      • Mobile Device Security Expert Q&A Part II: Start treating phones as computers
      • Mobile Device Security Expert Q&A Part I: Where BYOD policy goes wrong
      • InformationWeek: 7 Ways To Toughen Enterprise Mobile Device Security
      • A Career in Forensics: 5 Key Steps
      • Implement user security awareness training
      • Forbes: Conversations On Cybersecurity: The Trouble With China, Part 1
      • Smart phones getting out of control? SANS hosts first Mobile Device Security Summit
      • REMnux 3 review – a treasure chest for the malware-curious
      • ComputerWorld Artikel: Industriekontrollsysteme ausser Kontrolle
      • Computerworld: Partly cloudy with a chance of hacking?
      • Forbes: Avoiding Heartbleed Hype, What To Do To Stay Safe