InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by InfoSec Institute
Aktualizace: 1 hodina 8 min zpět

Top 5 Security Apps for Android Users

20 Únor, 2018 - 23:07

Your smartphone is even more valuable than your wallet. If stolen or compromised, its contents can be used against you; if there is work-related information on there, it can also damage your job. That’s why it’s crucial you keep it safe from thieves and spies (as well as malware). To help, here are the top […]

The post Top 5 Security Apps for Android Users appeared first on InfoSec Resources.

Top 5 Security Apps for Android Users was first posted on February 20, 2018 at 4:07 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Threat Hunting – Malspam –Japan Office Infected

20 Únor, 2018 - 18:02

This is a lab that is conducted in a test bed. The resources were downloaded from malware.trafficanalysis.net. The samples provided came from a case study of a Japanese field office that was a victim of a major Cyber-attack. Scenario You work as a security analyst for a company with locations worldwide, and recently, corporate headquarters […]

The post Threat Hunting – Malspam –Japan Office Infected appeared first on InfoSec Resources.

Threat Hunting – Malspam –Japan Office Infected was first posted on February 20, 2018 at 11:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

SecurityIQ Update Adds New Gamification Tools, Content & Integrated Assessments

20 Únor, 2018 - 15:50

SecurityIQ’s new learner completion certificates and microlearning video series make it easier than ever to boost program engagement. Now fully integrated, learner assessments go one step further to simplify program automation and track training impact overtime. Read on for complete release details. Gamify Learning With Training Completion Certificates Reward your security awareness champions with SecurityIQ’s […]

The post SecurityIQ Update Adds New Gamification Tools, Content & Integrated Assessments appeared first on InfoSec Resources.

SecurityIQ Update Adds New Gamification Tools, Content & Integrated Assessments was first posted on February 20, 2018 at 8:50 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

10 Steps Leaders Can Take to Improve Cybersecurity in their Organization

19 Únor, 2018 - 21:08

As revealed by an executive opinion survey in the World Economic Forum’s (WEF) Global Risk Report, the top concern for business leaders moving into 2018 is the potential for a cyber attack that may result in system and service interruptions and infiltrations of critical infrastructure. Despite that, another survey by PwC, the 2018 Global State […]

The post 10 Steps Leaders Can Take to Improve Cybersecurity in their Organization appeared first on InfoSec Resources.

10 Steps Leaders Can Take to Improve Cybersecurity in their Organization was first posted on February 19, 2018 at 2:08 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Top 25+ Information Security Events and Conferences of 2018

17 Únor, 2018 - 20:01

Information security (InfoSec) conferences are a great way to become familiar with new developments and later trends in technology, as well as be made aware of the recent products and services to tackle today’s challenges arising from network weaknesses. They are also an occasion to share knowledge and tips with other professionals in the field, […]

The post The Top 25+ Information Security Events and Conferences of 2018 appeared first on InfoSec Resources.

The Top 25+ Information Security Events and Conferences of 2018 was first posted on February 17, 2018 at 1:01 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top Ten Information Security Thought Leaders

17 Únor, 2018 - 19:27

Living in an information age can be daunting. Even if you manage to cut out the noise of social media, and the unceasing barrage of ads, there is still an element of digital dependence that can torment you. We rely so heavily on the World Wide Web in daily life – everything from accessing our […]

The post Top Ten Information Security Thought Leaders appeared first on InfoSec Resources.

Top Ten Information Security Thought Leaders was first posted on February 17, 2018 at 12:27 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top Five Open Source Intelligence (OSINT) Tools

17 Únor, 2018 - 18:01

In this article, we will look at top five Open Source Intelligence tools. Before we jump directly on tools, it is essential to understand what is Open Source Intelligence(OSINT) and how it can benefit researchers/malware actors/organizations, etc. What is OSINT? Open Source Intelligence(OSINT) refers to a collection of data from public sources to be used […]

The post Top Five Open Source Intelligence (OSINT) Tools appeared first on InfoSec Resources.

Top Five Open Source Intelligence (OSINT) Tools was first posted on February 17, 2018 at 11:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Top 5 Penetration Testing Tools and Their Reporting Features

17 Únor, 2018 - 17:29

Introduction In the Cybersecurity world today, there is one methodology that has proven to be quite effective in determining the security vulnerabilities of any business entity: Penetration Testing. It can be explicitly defined as follows: “It is the practice of testing a computer system, network, or web application, to find the vulnerabilities that an attacker […]

The post The Top 5 Penetration Testing Tools and Their Reporting Features appeared first on InfoSec Resources.

The Top 5 Penetration Testing Tools and Their Reporting Features was first posted on February 17, 2018 at 10:29 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Top Ten IoT Vulnerabilities

17 Únor, 2018 - 14:38

Kevin Ashton coined the phrase the “Internet of Things” (also known as “IoT”) back in 1999. This term represented the concept of a massive system where everyday appliances would communicate with each other through omnipresent sensors. Since then, consumers have connected smart devices amongst one another at an exponential rate. By 2020, there are estimates […]

The post The Top Ten IoT Vulnerabilities appeared first on InfoSec Resources.

The Top Ten IoT Vulnerabilities was first posted on February 17, 2018 at 7:38 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

PowerShell Language Modes-Part 1

16 Únor, 2018 - 21:28

In this article, we will discuss various PowerShell language modes. In Part 1 we will look at all the basics around PowerShell language and its various types. In Part 2 we will look at some of the bypasses which have been discovered in the previous version of Windows. What is Language Mode and its types? […]

The post PowerShell Language Modes-Part 1 appeared first on InfoSec Resources.

PowerShell Language Modes-Part 1 was first posted on February 16, 2018 at 2:28 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Privacy Concerns About Emotional Chatbots

16 Únor, 2018 - 21:11

Introduction Artificial Intelligence (AI) is evolving at an enormous speed and takes an increasingly more substantial part of our everyday life (think of the fully commercialized transactional robots Siri or Alexa as well intelligent agents in healthcare, automotive, and gaming industries). Being a classical representation of high-level machine intelligence, humanized, fully responsive machines perceiving and […]

The post Privacy Concerns About Emotional Chatbots appeared first on InfoSec Resources.

Privacy Concerns About Emotional Chatbots was first posted on February 16, 2018 at 2:11 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Consequences of the Late Announcement of Cyber-security Incidents

16 Únor, 2018 - 20:57

Introduction Cyber-security attacks that are becoming more and more common among various types and sizes of organizations may have serious effects on electronic communication networks, provision of services, and national security. Although significant breaches that affect many users or extensively disrupt the functioning of an organization usually receive extensive media coverage, smaller security incidents may […]

The post Consequences of the Late Announcement of Cyber-security Incidents appeared first on InfoSec Resources.

Consequences of the Late Announcement of Cyber-security Incidents was first posted on February 16, 2018 at 1:57 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Security Considerations Surrounding CryptoMining as a Service

16 Únor, 2018 - 14:00

Virtual Currency Mining Undoubtedly, one of the more interesting news stories to follow over the last year has been the rise (and currently: the fall) of cryptocurrencies. Bitcoin, of course, is the best-known variety, but other currencies such as Litecoin (up about 8000%), ripple (up over 10,000%) and Ethereum (up about 8500%) also saw a […]

The post Security Considerations Surrounding CryptoMining as a Service appeared first on InfoSec Resources.

Security Considerations Surrounding CryptoMining as a Service was first posted on February 16, 2018 at 7:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The Advantages & Disadvantages of Outsourcing Incident Response

13 Únor, 2018 - 15:41

Companies usually outsource tasks if they are more cost effective and can produce consistent results. Outsourcing incident response functions ensures a company will get consistent, reliable results if an incident occurs. Many cybersecurity jobs go unfilled, because the pool of qualified applicants is currently smaller than the amount of jobs available. Thus, finding the right […]

The post The Advantages & Disadvantages of Outsourcing Incident Response appeared first on InfoSec Resources.

The Advantages & Disadvantages of Outsourcing Incident Response was first posted on February 13, 2018 at 8:41 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 5 Ways to Reduce the Cost of a Data Breach

12 Únor, 2018 - 15:42

Introduction According to the 2017 Cost of Data Breach Study, data breach costs in 2017 averaged $3.62 million. This is a large sum, but depending on factors such as the number of records exposed or the nature of the leaked information, losses can be much greater and even include reputational damages that may take several […]

The post Top 5 Ways to Reduce the Cost of a Data Breach appeared first on InfoSec Resources.

Top 5 Ways to Reduce the Cost of a Data Breach was first posted on February 12, 2018 at 8:42 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

CRISC Domain 4: Risk and Control Monitoring and Reporting

9 Únor, 2018 - 22:28

What is Risk and Control Monitoring and Reporting? Risk monitoring and control are two elements that are responsible for keeping track of identified risks, residual risks, and new and emerging risks. In addition to this, they are also used to monitor the execution and implementation of plans for all of the known risks, and they […]

The post CRISC Domain 4: Risk and Control Monitoring and Reporting appeared first on InfoSec Resources.

CRISC Domain 4: Risk and Control Monitoring and Reporting was first posted on February 9, 2018 at 3:28 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

CRISC Domain 3: Risk Response and Mitigation

9 Únor, 2018 - 22:18

What is Risk Response and Mitigation? In order to understand Risk Response and Mitigation, we first need to separate the two definitions and define them properly. The two work together hand in hand, but are different in their approaches to keeping your company going. Risk Response: Risk response is a series of processes and procedures […]

The post CRISC Domain 3: Risk Response and Mitigation appeared first on InfoSec Resources.

CRISC Domain 3: Risk Response and Mitigation was first posted on February 9, 2018 at 3:18 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to Perform Qualitative & Quantitative Security Risk Analysis

9 Únor, 2018 - 18:46

This article describes two type of risk analysis (quantitative and qualitative) and presents five practical examples of calculating annualized loss expectancy (ALE). Finally, it also describes risk handling and countermeasures. The CIA Triad of Information Security Confidentiality, integrity and availability, or the CIA triad, is a model designed to guide policies for information security within […]

The post How to Perform Qualitative & Quantitative Security Risk Analysis appeared first on InfoSec Resources.

How to Perform Qualitative & Quantitative Security Risk Analysis was first posted on February 9, 2018 at 11:46 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Meet InfoSec Institute at HIMSS18

9 Únor, 2018 - 17:37

The InfoSec Institute team will be at HIMSS18 on March 6-8. Come find us in the Cybersecurity Command Center at booth #8600-47 to learn how our award-winning training services will help you secure PHI and motivate your workforce to care about security. See SecurityIQ in Action — And Get a FREE Phishing Diagnostic Test! Demos […]

The post Meet InfoSec Institute at HIMSS18 appeared first on InfoSec Resources.

Meet InfoSec Institute at HIMSS18 was first posted on February 9, 2018 at 10:37 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Incident Responder Career Roadmap: From Entry Level to Executive

9 Únor, 2018 - 15:28

Introduction Finding a career as an incident responder has never been more possible than it is today. Practically every medium- to large-sized company should have either an in-house dedicated team of cybersecurity specialists, or service providers that can perform the function of an incident responder on their behalf. Such teams can be deployed within strict […]

The post Incident Responder Career Roadmap: From Entry Level to Executive appeared first on InfoSec Resources.

Incident Responder Career Roadmap: From Entry Level to Executive was first posted on February 9, 2018 at 8:28 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security