Deploying Multi Factor Authentication – The What, How, and Why
A blog about deploying multi factor authentication. Continue reading Deploying Multi Factor Authentication – The What, How, and Why
Collaborate Disseminate
A blog about deploying multi factor authentication. Continue reading Deploying Multi Factor Authentication – The What, How, and Why
A blog about industrial control system incident response. Continue reading Insane Incident Incursion Recursion: Mastering Incident Response Reporting Regulations
We are excited to announce the latest update to the SANS Institute’s FOR585: Smartphone Forensic Analysis In-Depth! Continue reading Spring 2024 Update: Explore the Latest Enhancements to SANS FOR585: Smartphone Forensic Analysis In-Depth
We are excited to announce the latest update to the SANS Institute’s FOR585: Smartphone Forensic Analysis In-Depth! Continue reading Spring 2024 Update: Explore the Latest Enhancements to SANS FOR585: Smartphone Forensic Analysis In-Depth
A blog about NIS2 compliance. Continue reading The Ripple Effect: NIS2’s Impact on Cybersecurity Practices Across the EU
When approaching incident response in an environment you may not be very familiar with, the biggest challenge is often knowing what to look for. This is especially true when you’re facing dozens of data sources with hundreds of event types. As an incid… Continue reading Following the Trail of Threat Actors in Google Workspace Audit Logs
A blog about the importance of simulations and tabletop exercises Continue reading Enhancing Your Cyber Defense: Comparing Simulations and Tabletop Exercises
A blog about NIS2 compliance and leadership. Continue reading Beyond Compliance: Leveraging NIS2 for Enhanced Cyber Resilience and Leadership Accountability
Register for the ICS Security Summit to be able to participate in The Quest to Summit. Continue reading The Quest to Summit | SANS ICS Security Summit 2024
These are the topics most prevalent in countless discussions with security leaders and experts. Continue reading 4 Trends That Will Define the CISO’s Role in 2024