InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by Infosec
Aktualizace: 48 min 1 sek zpět

Outsourcing cybersecurity: What services to outsource, what to keep in-house

20 Květen, 2020 - 15:03

The growing need for outsourced cybersecurity The growing number and sophistication of threats that organizations face daily puts a bigger demand on cybersecurity. With roaming users accessing the network and data from everywhere, the challenges of protecting assets are even greater and require an increasing number of resources. To help solve some of these challenges, […]

The post Outsourcing cybersecurity: What services to outsource, what to keep in-house appeared first on Infosec Resources.

Outsourcing cybersecurity: What services to outsource, what to keep in-house was first posted on May 20, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Critical security concerns for the financial services industry

20 Květen, 2020 - 15:00

Compliance regulations in the financial services industry  The financial services industry is heavily regulated with compliance requirements focusing on the management of risk and fraud. The sector must comply with a raft of regulatory measures, including:  PSD2 MLD4 MiFID PCI-DSS GLBA SOX EBA National/state data protection law Financial service providers also must comply with the […]

The post Critical security concerns for the financial services industry appeared first on Infosec Resources.

Critical security concerns for the financial services industry was first posted on May 20, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Cybersecurity budgeting and spending trends 2020: How does yours compare?

19 Květen, 2020 - 15:03

Cybersecurity spending grows Protecting data and assets becomes more complicated as threats evolve. Cybersecurity budgets continue to grow every year, reflecting this complexity. Analyst data shows that spending on cybersecurity is not only growing, but also growing faster than IT spending overall. Gartner has estimated that worldwide security spending grew 10.5% in 2019, compared to […]

The post Cybersecurity budgeting and spending trends 2020: How does yours compare? appeared first on Infosec Resources.

Cybersecurity budgeting and spending trends 2020: How does yours compare? was first posted on May 19, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Critical security concerns facing government

19 Květen, 2020 - 15:00

Challenge 1: Staying compliant If the government enforces regulations, then its various departments and functions must also comply with those same regulations. Major data security regulations include: Federal Information Security Management Act (FISMA): This is part of the 2002 Homeland Security Act, which mandates how federal agencies should protect their systems and information. It applies […]

The post Critical security concerns facing government appeared first on Infosec Resources.

Critical security concerns facing government was first posted on May 19, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Hack the Box (HTB) machines walkthrough series — Mango

18 Květen, 2020 - 15:03

Today, we will be continuing with our exploration of Hack the Box (HTB) machines as seen in previous articles. This walkthrough is of an HTB machine named Mango. HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. Individuals have to solve the puzzle (simple […]

The post Hack the Box (HTB) machines walkthrough series — Mango appeared first on Infosec Resources.

Hack the Box (HTB) machines walkthrough series — Mango was first posted on May 18, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Critical security concerns facing the energy & utility industry

18 Květen, 2020 - 15:03

A perfect storm of technical & human vulnerabilities The global dependency and wide use of utility companies makes the system highly vulnerable to both natural and human-made disasters. This industry is an especially attractive target for state-sponsored and cybercrime gangs, who often launch attacks for political and extortion reasons.  Stuxnet is an infamous example — […]

The post Critical security concerns facing the energy & utility industry appeared first on Infosec Resources.

Critical security concerns facing the energy & utility industry was first posted on May 18, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

7 ways K-12 teachers can help close the cybersecurity skills gap

14 Květen, 2020 - 15:03

Introduction Security professionals have grown ubiquitous across many industries. However, the workforce is still seeing a shortage of talent that actually has the knowledge and skills to defend businesses against cyber threats, especially at advanced levels of experience. In fact, due to a global surge in cybersecurity awareness (and consequently, hiring demand), the skills gap […]

The post 7 ways K-12 teachers can help close the cybersecurity skills gap appeared first on Infosec Resources.

7 ways K-12 teachers can help close the cybersecurity skills gap was first posted on May 14, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Hack the Box (HTB) machines walkthrough series — Registry

14 Květen, 2020 - 15:03

Today, we will be continuing with our exploration of Hack the Box (HTB) machines as seen in previous articles. This walkthrough is of an HTB machine named Registry. HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. Individuals have to solve the puzzle (simple […]

The post Hack the Box (HTB) machines walkthrough series — Registry appeared first on Infosec Resources.

Hack the Box (HTB) machines walkthrough series — Registry was first posted on May 14, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to get security clearance and win more contracts

13 Květen, 2020 - 15:03

Introduction Having a security clearance can increase your job options and make you a more sought-after employee. An individual is not authorized to obtain a clearance on their own: they must be sponsored by the government or a cleared contracting company. Many employers would prefer to hire a candidate that already has a security clearance, […]

The post How to get security clearance and win more contracts appeared first on Infosec Resources.

How to get security clearance and win more contracts was first posted on May 13, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Kwampirs malware: what it is, how it works and how to prevent it | Malware spotlight

13 Květen, 2020 - 15:00

Introduction Supply chain compromise has become more of a concern as of late, with the appearance of COVID-19 affecting many industries — especially healthcare. Attack groups are taking advantage of this vulnerability of modern society by targeting the supply chain of ICS firms, healthcare, IT and other critical infrastructure industries.  One such malware, known as […]

The post Kwampirs malware: what it is, how it works and how to prevent it | Malware spotlight appeared first on Infosec Resources.

Kwampirs malware: what it is, how it works and how to prevent it | Malware spotlight was first posted on May 13, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Critical security concerns facing the technology industry

12 Květen, 2020 - 15:03

Executive summary Of the top five most valuable brands in North America in 2019, four were information technology companies. Information technology has provided a backbone of innovation that is pushing global economies forward and delivering the tools needed to support Industry 4.0. Such a high profile brings its own challenges: cybercriminals have taken note and […]

The post Critical security concerns facing the technology industry appeared first on Infosec Resources.

Critical security concerns facing the technology industry was first posted on May 12, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Security first: Compliance by design

12 Květen, 2020 - 15:00

Introduction Whether it’s the General Data Protection Regulation (GDPR) or the New York Stop Hacks and Improve Electronic Data Security Act (NY SHIELD), nearly every regulation or industry standard that touches the IT department incorporates “security by design” or “privacy by design.” Meanwhile, organizations increasingly recognize that compliance is not equal to security or privacy. […]

The post Security first: Compliance by design appeared first on Infosec Resources.

Security first: Compliance by design was first posted on May 12, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Zoombombing: How it works and how to prevent it from happening to you

11 Květen, 2020 - 15:03

Introduction COVID-19 is likely to be the Oxford English Dictionary’s word of the year for 2020. But as well as entering our lexicon across the world, it has also changed us at a cultural level. One aspect of this is in how we communicate at work. Online collaboration platforms were already seeing a hiatus before […]

The post Zoombombing: How it works and how to prevent it from happening to you appeared first on Infosec Resources.

Zoombombing: How it works and how to prevent it from happening to you was first posted on May 11, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 5 enterprise tools that have free home trials

11 Květen, 2020 - 15:01

Introduction Cybersecurity threats and attacks are coming faster and more persistently than ever, especially with the scattered nature of companies and the altered day-to-day operations of nearly every business in the world economy. Businesses in particular are ripe targets for cyber-attacks, as they store and process Personally Identifiable Information (PII) of customers or/and employees.  Under […]

The post Top 5 enterprise tools that have free home trials appeared first on Infosec Resources.

Top 5 enterprise tools that have free home trials was first posted on May 11, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security