New Collar: How Digital Badges and Skilling for Students Can Reduce the Skills Gap

As the mom of a recent high school graduate, I silently cringe when a well-meaning person asks where he is heading to college. I’d prefer they asked a more open-ended question about what his plans for the future are. In fact, my son is headed to a state university for a four-year degree in the […]

The post New Collar: How Digital Badges and Skilling for Students Can Reduce the Skills Gap appeared first on Security Intelligence.

Continue reading New Collar: How Digital Badges and Skilling for Students Can Reduce the Skills Gap

New Collar: How Digital Badges and Skilling for Students Can Reduce the Skills Gap

As the mom of a recent high school graduate, I silently cringe when a well-meaning person asks where he is heading to college. I’d prefer they asked a more open-ended question about what his plans for the future are. In fact, my son is headed to a state university for a four-year degree in the […]

The post New Collar: How Digital Badges and Skilling for Students Can Reduce the Skills Gap appeared first on Security Intelligence.

Continue reading New Collar: How Digital Badges and Skilling for Students Can Reduce the Skills Gap

Managed Detection and Response in Q4 2020

During the reported period, our MDR processed approximately 65 000 alerts, followed by an investigation that resulted in 1 506 incidents reported to customers, approximately 93% of which were mapped to the MITRE ATT&CK framework. Continue reading Managed Detection and Response in Q4 2020

Quick look at CVE-2021-1675 & CVE-2021-34527 (aka PrintNightmare)

Last week Microsoft warned Windows users about vulnerabilities in the Windows Print Spooler service – CVE-2021-1675 and CVE-2021-34527 (also known as PrintNightmare). We are closely monitoring the situation and improving generic detection of these vulnerabilities. Continue reading Quick look at CVE-2021-1675 & CVE-2021-34527 (aka PrintNightmare)

4 Ways to Improve Governance in Product Security

Security is all about closing gaps—between attacker tactics and your defensive capabilities, for instance, or the known and unknown user identities in your cloud infrastructure. An important gap that too many organizations overlook actually starts at … Continue reading 4 Ways to Improve Governance in Product Security

Detecting unknown threats: a honeypot how-to

Dan Demeter, Senior Security Researcher with Kaspersky’s Global Research and Analysis Team and head of Kaspersky’s Honeypot project, explains what honeypots are, why they’re recommended for catching external threats, and how you can set up your own simple SSH-honeypot. Continue reading Detecting unknown threats: a honeypot how-to

How to confuse antimalware neural networks. Adversarial attacks and protection

Сybersecurity companies implement a variety of methods to discover previously unknown malware files. Machine learning (ML) is a powerful and widely used approach for this task. But can we rely entirely on machine learning approaches in the battle with the bad guys? Or could powerful AI itself be vulnerable? Continue reading How to confuse antimalware neural networks. Adversarial attacks and protection

Targeted Malware Reverse Engineering Workshop follow-up. Part 2

The Reverse Engineering webinar audience having been so active not only were we unable to address all the incoming questions online, we didn’t even manage to pack the rest of them in one blogpost. So here comes the second part of the webinar follow-up. Continue reading Targeted Malware Reverse Engineering Workshop follow-up. Part 2