Protect your organization's sensitive and critical data with a documented data security policy, a best practice for meeting compliance requirements under data privacy laws like the EU's General Data Protection Regulation (GDPR).
Despite substantial increases in cybersecurity defenses around the globe, 2022 was another year of high-profile cyberattacks. Moreover, today’s economic and geopolitical uncertainty are adding to the risks that organizations face.
Cyber threat intelligence can help organizations analyze risks, allocate resources, and understand threats relevant to your industry and geography.
Ponemon Institute is pleased to present the results of The 2021 Cost of Phishing Study sponsored by Proofpoint. Initially conducted in 2015, the purpose of this research is to understand the risk and financial consequences of phishing. For the first time in this year’s study we look at the threats and costs created by business email compromise (BEC), identity credentialing and ransomware in the workplace.
Learn how to create an Active Directory delegation model to grant users elevated permissions without adding them to highly privileged groups like Domain Admins and Account Operators.
IntSights Threat Command takes the complexity out of threat intelligence and delivers instant value without the heavy lift of traditional threat intelligence solutions by continuously discovering the critical threats targeting your business, and mapping that intelligence to your unique digital assets and vulnerabilities.
Cybersecurity, Ransomware, and Email Fraud in the Year that Changed the World. This report gives a deep dive into user risk.
This e-book is intended not only for beginner SysAdmins who want learn about Active Directory structure, key terminology and configurations.
The Seven Strategies for Researching the Deep and Dark Web
This survey was conducted online by CSA from January to February 2022 and received 340 responses from IT and security professionals from various organization sizes and locations. CSA’s research team performed the data analysis and interpretation for this report.
Discover the dangerous evolution of ransomware - from simple lock screens to crypto-ransomware that stealthily encrypts all your files.
Making the most of Cybersixgill’s Investigative Portal and API
U.S. Securities & Exchange Commission Cybersecurity Risk Management, Governance & Incident Disclosure Rules