Podcast – Malcolm, a new tool for network visibility
Jens Wiesner of the German BSI explores Malcolm, a new (free, open source) tool for OT network visibility, brought to us by the U.S. Idaho National Labs (INL). The post Podcast – Malcolm, a new tool...
View ArticleDownload: The Risk Mitigation Handbook for Connected Medical Devices
Wondering what it takes to secure clinical networks in your healthcare organization? Get The Risk Mitigation Handbook for Connected Medical Devices, a practical approach to risk mitigation in connected...
View ArticleeBook: How Hackers Plan Their Attacks
Being the good guys, we think about how to protect ourselves from cyberattacks. But have you ever tried thinking like hackers planning their next attack? BitDam founders used to serve at the offensive...
View ArticleDownload: Security for Management PPT template
On top of being engaged with breach protection activities, the CISO must effectively translate security issues for non-security-savvy executives in a clear and business-risk oriented manner. The CISO...
View ArticleDownload: State of Breach Protection 2020 survey results
What are the key considerations security decision makers should take into account when designing their 2020 breach protection? To answer this, Cynet polled 1,536 cybersecurity professionals to...
View ArticleCynet empowers IT resellers and service providers to become MSSPs
Until recently, IT integrators, VARs and MSPs haven’t participated in the growing and profitable MSSP market as it entailed massive investments in building an in-house skilled security team. However,...
View ArticleCynet announces special offer for Symantec customers
Cynet announced a special offering for Symantec customers, enabling them to seamlessly switch to Cynet 360. Any Symantec customer with a coming license renewal in 2020 can switch to Cynet now and their...
View ArticleeBook: 8 Real World Use Cases for SOAR
Download this 11-page e-book with eight real-world use cases to see how security orchestration, automation and response (SOAR) can improve your team’s productivity and efficiency by automating security...
View ArticleDownload: IR Management and Reporting PowerPoint template
While the IR process is mostly technical, reporting to the organization’s management should take place on a much higher-level in order for the non-security savvy executives to understand. To assist...
View ArticleDownload: The (ISC)2 Exam Action Plan for CISSP, SSCP, or CCSP certification
Make this year your year for (ISC)² certification. Prepping for an (ISC)² credential is a big commitment. Maybe you’ve started on the path to achieving CISSP, SSCP or CCSP certification, but life got...
View Article
More Pages to Explore .....