Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

The Top Cybersecurity Websites and Blogs of 2020

The information security landscape is constantly evolving, which is why it's so important to stay up to date with the latest trends, threats, and advancements. Given that a Google search for cybersecurity websites produces millions of results, we thought we thought we'd compile a list of the best. Adam Shostack & friends is a group blog on security, liberty, privacy, and economics.

Veriato Vision Intro and Demo

Veriato Vision employee monitoring software lets you record and track all of your employees' activity... so you’ll know if they are working hard or hardly working. Vision gives you granular control over what activities and programs you monitor. Once the Vision software is deployed on the company's PCs, Macs, and Androids, you can remotely monitor by the department, group, or individual. Additionally, you can monitor employees that are off-network or working remotely.

Netwrix Data Classification - Overview

Netwrix Data Classification is a software platform that helps you solve your most critical data security, content optimization and compliance needs, regardless of where your data is located. Every day employees produce tons of data. This skyrocketing data growth causes problems across the organization. Users can’t find the documents they need. Sensitive files get placed on public shares. Data storages reach their limits. It’s harder and harder for you to satisfy requests from your legal and compliance departments. Don’t let this pressure get a hold.

The MITRE ATT&CK Framework: Command and Control

Most malware these days has some level of Command and Control. This can be to exfiltrate data, tell the malware what instructions to execute next, or download encryption keys in the case of ransomware. In each case of command and control, the attacker is accessing the network from a remote location. Having insight into what is happening on the network is going to be crucial in addressing these techniques.

A guide to penetration testing for compliance

In many cases, penetration testing – a type of ethical hacking engagement designed to identify and address security vulnerabilities in networks, systems and applications – is required. Sometimes this requirement is specified directly, while in other cases it is implied by a need to build audit or assessment processes to mitigate cyber risk. This blog identifies some of the most common pen testing standards and regulations and provides guidance about the type of testing required.

What Is Third-Party Risk Management?

Third-party risk management (TPRM) is the process of analyzing and minimizing risks associated with outsourcing to third-party vendors or service providers. This is commonly known as third-party risk or vendor risk and can include financial, environmental, reputational, and security risks due to a vendor's access to intellectual property, sensitive data, personally identifiable information (PII), and protected health information (PHI).