Learn everything about SSL certificates—their function, types, and how they protect your publicly facing websites.
Posts tagged with "Cybersecurity"
15 presentations found
Demystify the cybersecurity standards landscape with a data-driven scorecard comparing frameworks like ISO 27001 and CIS Controls, and discover a practical "Cyber Rosetta Stone" for informed security decisions.
Explore methodologies for tracking botnet software, victims, operators, and servers while diving into malware analysis and threat hunting techniques to combat the $180 billion annual damage from botnets.
Cyber Management
Cyber risk and security are different concepts—learn methods for cyber risk and security practices, and how to develop metrics to better manage your team.
Phishing is the most common form of cyber crime—learn how to set up Gophish to help your users recognize and detect phishing emails before they become another statistic.
HPC security has different challenges than private industry, often prioritizing performance—learn about innovative solutions and security career paths in STEM.
Ransomware has evolved into a substantial geo-political and economic threat—learn about unique tactics, threat actors, and strategies to protect your company's assets.
Explore highlights and insights from the 2021 Verizon Data Breach Investigations Report—the world's most comprehensive analysis of security threats and breaches across industries.
DevOps and cloud have transformed technology—explore the hard split in the security community and how the "new" security practitioner differs from the "old."
Explore the most extensive cyber attack in US history—walk through the chain of events and technical logic of the SolarWinds attack that created backdoors across government and industry.
From the White House to presidential campaigns—hear the story of the first CISO in presidential campaign history and a career dedicated to cybersecurity in public service.
Move beyond boring reports and email opens—learn to use data science techniques and statistics to measure what actually matters for security posture and organizational culture.
Learn what CMMC is, why the US Department of Defense is implementing it, the assessment process, and what will be assessed from a security standpoint.
Take a behind-the-scenes look at the daily work of a Sword & Shield consultant, from audits to ethical hacking and navigating key compliance frameworks.
Related Tags
Tags that frequently appear together with Cybersecurity