cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Blog

(ISC)² Team
(ISC)² Team
The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together Many organizations are so busy responding to and remediating indents that they don’t have the time, resources or framework for being proactive and searching for these threats. Automat... view more
0 Kudos
0 Comments
382 Views
(ISC)² Team
(ISC)² Team
(ISC)² recently completed our multi-year Digital End-to-End Transformation (DETE) project, which positions us to deliver a more a seamless and user-friendly experience to all members. In addition to revamping our online presence, we launched a new Learnin... view more
3 Comments
1496 Views
(ISC)² Team
(ISC)² Team
Scam and Phishing emails continue to put organizations of all sizes at risk. A favored vector of attack is the use of a malicious Office document attachment or PDFs to gain a foothold into a targeted system. These types of threats can put account credenti... view more
0 Kudos
0 Comments
305 Views
(ISC)² Team
(ISC)² Team
HID Global and (ISC)2 presents our final live webcast of the year - Halt! Who Goes There? Improving the Intersection of Identity & Security - December 6, 2018, 1PM Eastern. With the multiple points of access to an organization, both internal and external,... view more
0 Kudos
0 Comments
361 Views