A Tale of the Three *ishings: Part 1 – What is Phishing?
Part one of a three-part blog series about the different types of phishing. Continue reading A Tale of the Three *ishings: Part 1 – What is Phishing?
Collaborate Disseminate
Part one of a three-part blog series about the different types of phishing. Continue reading A Tale of the Three *ishings: Part 1 – What is Phishing?
Learn all about the newly updated Security Strategic Planning, Policy, and Leadership Course; LDR514. Continue reading A Three-Slide Executive Presentation?
A blog about solving the human risk problem through leadership’s management of human risk Continue reading Solving the Human Risk Problem: Engaging and Securing Your Workforce
Mature ICS facilities in the region realize and embrace the differences between IT and ICS/OT. Continue reading Critical Infrastructure Cyber Threats & The UK Region
Mature ICS facilities in the region realize and embrace the differences between IT and ICS/OT. Continue reading Critical Infrastructure Cyber Threats & The UK Region
A blog on continuous purple teaming with CALDERA. Continue reading Continuous Purple Teaming: A Practical Approach for Strengthening Your Offensive Capabilities
A blog about the need for robust data protection policies Continue reading Three Common Threats to Your Organization’s Data to be Aware of on Data Protection Day
SANS Cybersecurity Blog pertaining to a summary of the SANS CTI Summit 2024 Continue reading A Visual Summary of SANS CTI Summit 2024
A blog about SANS Institute’s 2023 multicloud survey findings Continue reading SANS 2023 Multicloud Survey: Navigating the Complexities of Multiple Clouds
The recent FOR528 course update brings about streamlining of course timing, better addresses the differences between ransomware and cyber extortion, and provides new hands-on lab opportunities. Continue reading FOR528: Ransomware & Cyber Extortion Course Updates Implemented – What’s New?