Tag: EN

How threat actors abuse OAuth apps

OAuth apps have become prominent in several attack groups’ TTPs in recent years. OAuth apps are used for every part of the attack process. In this Help Net Security video, Tal Skverer, Research Team Lead at Astrix Security, shares insights…

Security Awareness Training: Building a Cyber-Resilient Workforce

Discover the crucial role of security awareness training in building a cyber-resilient workforce and learn key strategies for implementing successful programs. The post Security Awareness Training: Building a Cyber-Resilient Workforce appeared first on Security Zap. This article has been indexed…

Data Breach Response: A Step-by-Step Guide

Just when you thought your organization was prepared for anything, a data breach strikes – discover the step-by-step guide to navigate this treacherous terrain. The post Data Breach Response: A Step-by-Step Guide appeared first on Security Zap. This article has…

Info-Tech report outlines 5 GenAI initiatives CIOs must key in on

As generative artificial intelligence (GenAI) continues to reshape the digital landscape, CIOs and IT leaders are at a pivotal point, tasked with navigating the profound opportunities and challenges this disruptive technology presents, a new report from Info-Tech Research Group concludes.…

Ransomware Retrospective 2024: Unit 42 Leak Site Analysis

Analysis of ransomware gang leak site data reveals significant activity over 2023. As groups formed — or dissolved — and tactics changed, we synthesize our findings. The post Ransomware Retrospective 2024: Unit 42 Leak Site Analysis appeared first on Unit…

SOC Evolution Is About More Than Automation

[By Michael Mumcuoglu, CEO and Co-Founder, CardinalOps] It is worth remembering; cybersecurity professionals inherently win, only when attackers lose. Although it may feel like a victory, we don’t win when we merely maintain operations or even when we put processes in place and…

NetSecOps best practices for network engineers

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: NetSecOps best practices for network engineers