Gamification in Cyber Security

Reading Time: < 1 minute Make cyber learning fun again! Gamification is being applied to cybersecurity training for professional development purposes. Game mechanics can help security professionals improve information security techniques and diversify cyber thinking to better prevent and mitigate cyber threats. Gamified cyber exercises encourage healthy cyber hygiene behavior and improve security training retention Read more…

Safe Holiday Shopping

Reading Time: < 1 minute Online shopping is the new norm in today’s world, replacing brick and mortar shops one transaction at a time. With this shift in online consumerism, cybercriminals are taking notice. To mitigate the risks that come from online shopping, there are a few things you can do to better protect yourself.

What is a Watering Hole?

Reading Time: < 1 minute Cyber criminals are clever and know how to evolve. They’ve proven this once again with their latest cyber-attack strategy, the Watering Hole Attack, which leverages cloud services to help gain access to even the most secure and sophisticated enterprises and government agencies. Recognizing a watering hole attack and how it Read more…

What is DevSecOps?

Reading Time: < 1 minute In today’s application development landscape, cyber attacks have become more frequent and sophisticated. Security architects are looking for new ways to ensure their products are safe and working properly for customers.

What is Phishing?

Reading Time: < 1 minute Most of us have probably heard about cyber adversaries using methods such as Phishing, Spear-Phishing, Whaling, Pharming, Drive by Downloads and Watering Holes creative ways to steal users credentials. These cleverly named attacks have been around for years but are still one of the most successful methods used to gain Read more…

What is Cyber Risk?

Reading Time: < 1 minute Most simply, cyber risk means any risk of financial loss, disruption or damage to the reputation of an organization from some sort of failure of its information technology systems. Cyber risk attempts to measure, in dollars lost, the impact of events based on their probability and severity.

What is a Red Team?

Reading Time: < 1 minute A “Red Team” is a group of people trained in the art of hacking, but using their skills for “good” (also known as an ethical, or white hat hacker). This group challenges an organization to improve its effectiveness by assuming an adversarial role or point of view.

What is a Cyber Range?

Reading Time: < 1 minute Users generate a lot of traffic, and the systems which you depend on are expected to be available 24/7. You need to be on top of the latest threats to your organization and limit any potential down time for your infrastructure. Cyber ranges are virtual environments where cyber professionals can Read more…