How Old-School Hackers Are Enabling the Next Generation of Offensive Security Professionals

As an industry, cybersecurity has come a long way since it first started in the late 1990s. Back then we

Read more

How to Start Building an Insider Threat Program

Sometimes, it only takes one moment — one life-changing incident — for the most trustworthy employee to become an insider

Read more

Why Cities Shouldn’t Pay Ransomware Criminals

Cities, local governments, and other institutions such as schools and hospitals are increasingly targeted by cybercriminals, with approximately 170 U.S.

Read more

How Analysts Connect Threat Intelligence Sources to Make Investigations More Efficient

I remember it like it was yesterday. I was supporting a counterterrorism task force and sitting in the heart of

Read more

Disappearing Act: What Magic Tricks Can Teach CISOs About Malware Prevention

If chief information security officers (CISOs) could wave a magic wand and make one cybersecurity issue vanish, malware would top

Read more

What Is SIEM and How Does It Enhance Threat Detection?

Although security information and event management (SIEM) has been around for more than a decade, the solution continues to evolve.

Read more