The Power of 2: How Automated Threat Hunting & ATT&CK Can Work Together
Many organizations are so busy responding to and remediating indents
that they don’t have the time, resources or framework for being
proactive and searching for these threats. Automat...
(ISC)² recently completed our multi-year Digital End-to-End
Transformation (DETE) project, which positions us to deliver a more a
seamless and user-friendly experience to all members. In addition to
revamping our online presence, we launched a new Learnin...
Scam and Phishing emails continue to put organizations of all sizes at
risk. A favored vector of attack is the use of a malicious Office
document attachment or PDFs to gain a foothold into a targeted system.
These types of threats can put account credenti...
HID Global and (ISC)2 presents our final live webcast of the year -
Halt! Who Goes There? Improving the Intersection of Identity & Security
- December 6, 2018, 1PM Eastern. With the multiple points of access to
an organization, both internal and external,...