Security training

Security training News

View All News

Security training Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Security training Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Security training

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security training Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Defending against the digital invasion

    As attackers move beyond “spray and pray” tactics to advanced persistent threats -- having better security than your competitors is no longer enough. Targeted attacks today are often for financial gain through extortion and threats to expose or delete sensitive data, and organizations need to make sure they’re prepared. We cover countermeasures to help organizations defend against evolving attack techniques and detect intrusions faster to minimize the damage. Johannes Ullrich, SANS Institute CTO and head of the Internet Storm Center, outlines the top emerging cyberthreats in 2015, from the Internet of Things and bring your own device to subtle data manipulations that influence business decisions and enterprise ransomware.

    Another big problem with security continues to be social engineering, which we also look at in this issue. Many organizations are moving beyond prevention to detection strategies, including automated breach detection and data-centric security measures. We also look at cybersecurity hiring strategies, employee development and ways to address geographical shortfalls. As some salaries skyrocket after a breach-laden 2014, is cybersecurity hiring in a state of crisis?

    Privacy Professor CEO Rebecca Herold shares her take on third-party security measures with Marcus Ranum. She offers solid advice on ways to hold contractors accountable. Finally, Editorial Director Robert Richardson looks at big data analytics as commercial tools, whose origins can be traced to NSA engineers, start to become available for large enterprises. Continue Reading

  • How can drive-by download attacks be prevented?

    Expert Nick Lewis offers some strategies that enterprises can use to avoid the threat of drive-by download attacks and improve employee awareness of the risks. Continue Reading

  • Should enterprises enforce harsher penalties for phishing victims?

    The consequences of phishing attacks could fall on the victims as enterprises start to punish employees who fall for this age-old scam. Expert Joseph Granneman discusses why this approach may have merit. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close