cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

Tim_ISC2
ISC2 Team
ISC2 Team
The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these threats. Automat... view more
0 Kudos
0 Comments
923 Views
Tim_ISC2
ISC2 Team
ISC2 Team
(ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learnin... view more
3 Comments
2538 Views
Tim_ISC2
ISC2 Team
ISC2 Team
Scam and Phishing emails continue to put organizations of all sizes at risk. A favored vector of attack is the use of a malicious Office document attachment or PDFs to gain a foothold into a targeted system. These types of threats can put account credenti... view more
0 Kudos
0 Comments
708 Views
Tim_ISC2
ISC2 Team
ISC2 Team
HID Global and (ISC)2 presents our final live webcast of the year - Halt! Who Goes There? Improving the Intersection of Identity & Security - December 6, 2018, 1PM Eastern. With the multiple points of access to an organization, both internal and external,... view more
0 Kudos
0 Comments
708 Views