web analytics
0 - CT 0 - CT - SOC - CSIRT Operations - Cyber Incidents & Attacks Notepad Best Practices Cyber Security News For technologists Guest Blog Post rss-feed-post-generator-echo Steps forward The Last Watchdog Top Stories

GUEST ESSAY: The role advanced ‘VM’ is ideally suited to play in combating modern cyber attacks

By Chandrashekhar Basavanna Modern cyber attacks are ingenious — and traditional vulnerability management, or VM, simply is no longer very effective. Related: Taking a risk-assessment approach...

0 - CT 0 - CT - SOC - CSIRT Operations - SOC Operations Cyber Security News For consumers For technologists Guest Blog Post privacy rss-feed-post-generator-echo The Last Watchdog Top Stories

GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation

By Collin McNulty One common misconception is that scammers usually possess a strong command of computer science and IT knowledge. Related: How Google, Facebook enable snooping...

0 - CT 0 - CT - Cybersecurity Architecture - Zero Trust Security Cyber Security News For technologists Guest Blog Post rss-feed-post-generator-echo The Last Watchdog Top Stories

GUEST ESSAY: Testing principles to mitigate real-world risks to ‘SASE’ and ‘Zero Trust’ systems

By Sashi Jeyaretnam A new generation of security frameworks are gaining traction that are much better aligned to today’s cloud-centric, work-from-anywhere world. Related: The importance of...