IT.COM

cyber security

NameSilo
  1. Future Sensors

    security Avoiding Social Engineering and Phishing Attacks

    Social Engineering (Wikipedia.org) In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. Read more: https://en.wikipedia.org/wiki/Social_engineering_(security) Avoiding Social...
  2. Future Sensors

    security Avoiding Social Engineering and Phishing Attacks

    Social Engineering (Wikipedia.org) In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. Read more: https://en.wikipedia.org/wiki/Social_engineering_(security) Avoiding Social...
  3. Future Sensors

    security Cyber Security: Board Toolkit by ncsc.gov.uk

    Cyber Security: Board Toolkit by the National Cyber Security Centre (UK) What board members should know and what they should be asking their technical experts. Resources designed to encourage essential cyber security discussions between the Board and their technical experts. Boards are pivotal...
  4. Future Sensors

    security Cyber Security: Board Toolkit by ncsc.gov.uk

    Cyber Security: Board Toolkit by the National Cyber Security Centre (UK) What board members should know and what they should be asking their technical experts. Resources designed to encourage essential cyber security discussions between the Board and their technical experts. Boards are pivotal...
  5. Future Sensors

    security New activity from Russian actor Nobelium

    New activity from Russian actor Nobelium Today, we’re sharing the latest activity we’ve observed from the Russian nation-state actor Nobelium. This is the same actor behind the cyberattacks targeting SolarWinds customers in 2020 and which the U.S. government and others have identified as being...
  6. Future Sensors

    security New activity from Russian actor Nobelium

    New activity from Russian actor Nobelium Today, we’re sharing the latest activity we’ve observed from the Russian nation-state actor Nobelium. This is the same actor behind the cyberattacks targeting SolarWinds customers in 2020 and which the U.S. government and others have identified as being...
  7. Future Sensors

    security Conti Ransom Gang Starts Selling Access to Victims

    Conti Ransom Gang Starts Selling Access to Victims The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti’s malware who refuse to negotiate a ransom payment are added to Conti’s victim shaming blog, where confidential files...
  8. Future Sensors

    security Conti Ransom Gang Starts Selling Access to Victims

    Conti Ransom Gang Starts Selling Access to Victims The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti’s malware who refuse to negotiate a ransom payment are added to Conti’s victim shaming blog, where confidential files...
  9. Future Sensors

    security Cybersecurity Summit 2021: Girls Who Code Partnership

    Cybersecurity Summit 2021: Girls Who Code Partnership https://www.cisa.gov/cybersummit-2021-session-day-3-girls-who-code-partnership About the Speakers Jen Easterly, Director, Cybersecurity and Infrastructure Security Agency (CISA) Jen Easterly is the Director of the Cybersecurity and...
  10. Future Sensors

    security Cybersecurity Summit 2021: Girls Who Code Partnership

    Cybersecurity Summit 2021: Girls Who Code Partnership https://www.cisa.gov/cybersummit-2021-session-day-3-girls-who-code-partnership About the Speakers Jen Easterly, Director, Cybersecurity and Infrastructure Security Agency (CISA) Jen Easterly is the Director of the Cybersecurity and...
  11. Future Sensors

    security Hitting the BlackMatter gang where it hurts: In the wallet

    Hitting the BlackMatter gang where it hurts: In the wallet Earlier this year, Emsisoft researchers discovered a critical flaw in the BlackMatter ransomware that allowed them to help victims recover their files without paying a ransom, preventing millions of dollars falling into the hands of...
  12. Future Sensors

    security Hitting the BlackMatter gang where it hurts: In the wallet

    Hitting the BlackMatter gang where it hurts: In the wallet Earlier this year, Emsisoft researchers discovered a critical flaw in the BlackMatter ransomware that allowed them to help victims recover their files without paying a ransom, preventing millions of dollars falling into the hands of...
  13. Future Sensors

    security What are Indicators of Compromise (IOCs)?

    What are Indicators of Compromise (IOCs)? Indicators of compromise (IOCs) are pieces of forensic data, such as system log entries, system files or network traffic that identify potentially malicious activity on a system or network. Digital forensics security analysts and information security...
  14. Future Sensors

    security What are Indicators of Compromise (IOCs)?

    What are Indicators of Compromise (IOCs)? Indicators of compromise (IOCs) are pieces of forensic data, such as system log entries, system files or network traffic that identify potentially malicious activity on a system or network. Digital forensics security analysts and information security...
  15. Future Sensors

    security Cybersecurity Guide for Boardroom members

    Cybersecurity Guide for Boardroom members A sound approach to cybersecurity affects all aspects of your organisation: at the top (organisational structure) and across its breadth (service). It therefore presents a pre-eminent strategic challenge for the boardroom. Your IT department does of...
  16. Future Sensors

    security Cybersecurity Guide for Boardroom members

    Cybersecurity Guide for Boardroom members A sound approach to cybersecurity affects all aspects of your organisation: at the top (organisational structure) and across its breadth (service). It therefore presents a pre-eminent strategic challenge for the boardroom. Your IT department does of...
  17. Lox

    information Punjab police to hire domain experts

    With changing nature of crime necessitating support and interventions by domain experts for their effective prevention and detection, the Punjab Police will soon recruit around 3,100 experts in the fields of law, forensics, digital forensics, information technology, data mining, cyber security...
  18. Lox

    information Punjab police to hire domain experts

    With changing nature of crime necessitating support and interventions by domain experts for their effective prevention and detection, the Punjab Police will soon recruit around 3,100 experts in the fields of law, forensics, digital forensics, information technology, data mining, cyber security...
  • The sidebar remains visible by scrolling at a speed relative to the page’s height.
Back