cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

(ISC)² Team
(ISC)² Team
The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these threats. Automat... view more
0 Kudos
0 Comments
312 Views
(ISC)² Team
(ISC)² Team
(ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learnin... view more
3 Comments
1335 Views
(ISC)² Team
(ISC)² Team
Scam and Phishing emails continue to put organizations of all sizes at risk. A favored vector of attack is the use of a malicious Office document attachment or PDFs to gain a foothold into a targeted system. These types of threats can put account credenti... view more
0 Kudos
0 Comments
264 Views
(ISC)² Team
(ISC)² Team
HID Global and (ISC)2 presents our final live webcast of the year - Halt! Who Goes There? Improving the Intersection of Identity & Security - December 6, 2018, 1PM Eastern. With the multiple points of access to an organization, both internal and external,... view more
0 Kudos
0 Comments
311 Views