REGISTER

Information Security

d pdf Download (1.01 MB)

A board reporting checklist for CISOs

netwrixtn pdf Download (315 KB)

Rampant cybersecurity breaches continue to threaten all business types. Attacks continue to rise 50% year over year, with 61% of SMBs reporting at least one cyberattack in 2021.

netwrixtn pdf Download (927 KB)

Learn how to create an Active Directory delegation model to grant users elevated permissions without adding them to highly privileged groups like Domain Admins and Account Operators.

CCTNacl pdf Download (1.36 MB)

IntSights Threat Command takes the complexity out of threat intelligence and delivers instant value without the heavy lift of traditional threat intelligence solutions by continuously discovering the critical threats targeting your business, and mapping that intelligence to your unique digital assets and vulnerabilities.

dl pdf Download (4.54 MB)

Learn how to secure your Windows endpoints against cyberattacks by adopting the mindset of a cyber criminal. Discover the vulnerabilities that malicious hackers target and explore the tools and techniques ethical hackers use to better protect IT environments and sensitive information.

netwrixtn pdf Download (2.31 MB)

This e-book is intended not only for beginner SysAdmins who want learn about Active Directory structure, key terminology and configurations.

CCTNacl default Download

The Seven Strategies for Researching the Deep and Dark Web

netwrixtn pdf Download (4.44 MB)

Protect your organization's sensitive and critical data with a documented data security policy, a best practice for meeting compliance requirements under data privacy laws like the EU's General Data Protection Regulation (GDPR).

netwrixtn pdf Download (2.48 MB)

Discover the dangerous evolution of ransomware - from simple lock screens to crypto-ransomware that stealthily encrypts all your files.

CCTNacl default Download

Making the most of Cybersixgill’s Investigative Portal and API

netwrixtn pdf Download (1.51 MB)

Despite substantial increases in cybersecurity defenses around the globe, 2022 was another year of high-profile cyberattacks. Moreover, today’s economic and geopolitical uncertainty are adding to the risks that organizations face.

CCTNacl default Download

Cyber threat intelligence can help organizations analyze risks, allocate resources, and understand threats relevant to your industry and geography.

bitsighttn pdf Download (6.71 MB)

Ponemon Institute is pleased to present the results of The 2021 Cost of Phishing Study sponsored by Proofpoint. Initially conducted in 2015, the purpose of this research is to understand the risk and financial consequences of phishing. For the first time in this year’s study we look at the threats and costs created by business email compromise (BEC), identity credentialing and ransomware in the workplace.

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top