Laden...
March 05, 2019
This yearâs RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. Read more â¶
Google announces better, badder, bigger SIEM
3 ways to mitigate the risk of shadow IoT
What is Mimikatz? And how to defend against this password stealing tool
How to become an ethical hacker
Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)
Is the world ready for the next big ransomware attack?
One common goal is to embrace new opportunities. Learn how a strong network core can link your vital internal and external services. Read more â¶
Google/Alphabet's Chronicle cybersecurity moonshot has a doozy of a mega-gargantuan SIEM with huge pluses--and minuses. Take note. Read more â¶
FROM OUR BUSINESS PARTNERS
For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more â¶
When someone in your organization starts using internet-connected devices without ITâs knowledge, thatâs shadow IoT. Here's what you need to know about its growing risk. Read more â¶
Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PINs and Kerberos tickets. Read more â¶
Ethical hacking is legally breaking into computers and devices to test an organization's defenses. Hereâs what ethical hacking entails and the certifications and training you need to become an ethical hacker. Read more â¶
2018 was a busy year for mergers and acquisitions in the cybersecurity industry. Here's why the M&A market is so hot and what to expect in 2019. Read more â¶
WannaCry and NotPetya brought major companies to their knees and cost billions to remediate. A new report from Lloyds of London warns another similar ransomware attack would still be devastating. Read more â¶
Check out tips for Successful IoT/Analytics Projects here. Read more â¶
© 2024