Many organizations hear the term “malware” and immediately screech in fear. If you are interested in malware research, as long as you are using safe practices, there is not a lot to be afraid of. For those of you who are interested in malware research and figuring out how and why these pieces of malicious software do what they do, this article might be for you.
CIS control 2 speaks to basic cybersecurity hygiene, only it is software and applications specific. Often, attackers will look for unpatched or unsupported software to target, regardless of the system it is running on, or the type of business using it.
If you work in the field of Information Technology, you have probably heard of Vulnerability Assessment (VA). VA is a process of identifying security vulnerabilities in a system. It is recommended that you conduct a VA against your organization’s network every quarter, and if your organization follows certain policy and standards, such as PCI DSS, VA is a requirement. However, organizations should not be the only ones conducting VAs against their network; average home users should also conduct vulnerability assessment against their network. In this blog, I will guide you through the process of performing a VA against your network using Nessus Home.
It’s no question that in cybersecurity, defense is the best defense. In the constantly changing threat landscape, the tie often goes to the attacker, and businesses are forced to act like turtles putting up shells of security to ward off threats.
Many assume that “cyber” is a portmanteau derived from other words, but it’s not. Here’s a look at where the word cyber came from, the evolution of its usage, and a glimpse at the debate among the technical community on what it means and how to phrase it.
If you are anything like myself and my co-workers at Alpine Security, you’re obsessed with Cybersecurity and the impact of poor implementations. If you’re not like us, good for you! But there are still some things you ought to be aware of to help you protect your data, especially when traveling.
The IoT, as it is called, is a growing part of our lives and is something we all need to be aware of. Just last year (2017) there were reportedly 20 billion connected devices all around us. Every year, the number of IoT devices is rapidly growing. Although IoT devices make our lives easier, these devices are not safe from cyberattacks.
DoD 8570, the Cybersecurity Information Assurance Workforce Development Program, will soon be replaced by DoD 8140. DoD 8570 determines which cybersecurity certifications are required for Information Assurance positions in a United State’s government organization.
Connect with Us
- The State of Ransomware 2020
- National Cybersecurity Awareness Month: 6 Things to Practice During the Month
- Cybersecurity Checklist for Business Closures, Consolidations, and Acquisitions
- What Is DevSecOps?
- Cybersecurity and a Remote Workforce: What Does the Future Look Like?
- 6 Penetration Testing Trends to Have on Your Cybersecurity Radar
- Incorporating Privacy and Security by Design into MedTech
- What is the Difference Between CMMC, DFARS, and NIST 800-171?
- At Risk: Medical Device Cybersecurity Vulnerabilities Expose Patients to Life-threatening Consequences
- 5 Reasons to Hire a Fractional CISO
- Why Private Cybersecurity Training Matters for Your Organization
- Is the CEH Certification Right For You?
- Internal Penetration Test vs Vulnerability Assessment: Which is Right for You?
- Best Beginner Cybersecurity Certification to Get
- Penetration Testing for Compliance: The Top 5 Laws and Regulations that Require Testing