This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
While password spraying results in the infiltration of many accounts every year, it’s also one of the easiest attacks for cyber-aware employees to thwart. In other words, password spraying needs to be a top consideration for any successful cybersecurity platform.
To determine whether implementing gaming techniques for security awareness training at your organization makes sense, it is important to first understand what the ultimate goal of the security awareness course is. In many cases, gaming techniques can help employees overcome initial resistance to learning.
According to a Cynet 2021 CISO survey, which focused on CISOs with five or fewer security staff members, a majority of these organizations are overwhelmed by the volume of cyberattacks.
The University of Kent announced its Institute of Advanced Studies in Cyber Security and Conflict, a University-wide hub promoting interdisciplinary research and educational activities in cybersecurity and conflict. The institute will extend cybersecurity research into wider areas such as international conflict, cyber influence and behavior, cybercrime, cyber law and digital financial technology.
The average employee is the greatest risk to an organization’s security. Here’s how to rethink enterprise-wide training to fight cybercrime and utilize gamification to make it stick.
Waiting for a cyber threat to make an appearance is far too dangerous to an enterprise. To combat this, threat hunting is now an essential component of any cybersecurity strategy. But how does threat hunting work in practice, and how can the approach ensure an organization’s data is kept safe?
To help businesses combat the new cybersecurity threats posed by an increase in remote work amid the COVID-19 pandemic, this firm offers cybersecurity awareness training for free.
Shifting to a remote environment may have benefitted businesses, but not without introducing new cybersecurity risks. A data-backed strategy can help security leaders manage those risks.
The University of Texas at San Antonio (UTSA) and Port San Antonio have partnered to expand the region’s cybersecurity and data analytics research and development ecosystem and increase workforce education and training.