REGISTER

Information Security

netwrixtn pdf Download (167 KB)

Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact.

bktn pdf Download (649 KB)

The Progress company behind the popular MOVEit file transfer product has announced a second vulnerability. As part of the ongoing investigation, cybersecurity company Huntress conducted code reviews of the MOVEit product and uncovered a new vulnerability that could potentially be exploited. This newly discovered vulnerability was stated to be different from the previously reported vulnerability shared on May 31, 2023.

lansweeper pdf Download (1.50 MB)

Unlock the power of Cyber Asset Attack Surface Management (CAASM) with Lansweeper. Gain full visibility into your IT, IoT, and OT assets.

terranova pdf Download (2.48 MB)

This book will help executives and managers as well as all individuals to understand how to practically make each individual a first line of defense.

netwrixtn pdf Download (420 KB)

There is no way to prevent ransomware attacks and no silver bullet for defending against them. However, following these ransomware best practices will help you minimize the risk of ransomware infections and limit the damage that a successful attack could do.

ot pdf Download (959 KB)

Let’s face it, ISO 27001 isn’t the world’s most exhilarating topic. But that’s not why you’re here. Chances are, your company’s thinking about certification and you’ll be a key stakeholder for the project. Naturally, you want to know what ISO 27001 is all about. More than that, you want to set your team up for a successful audit.

CCTNacl pdf Download (2.50 MB)

Building cyber resilience for resource-constrained teams

bktn pdf Download (14.01 MB)

This Ransomware Threat Landscape: Ransomware Resurgence 2023 report examines the evolving landscape of ransomware attacks from April 1, 2022, to March 31, 2023.

ss pdf Download (511 KB)

On March 15, 2022, the Cybersecurity Incident Reporting for Critical Infrastructures Act of 2022 was signed into law.

ss pdf Download (802 KB)

Transform your cybersecurity strategy from reactive to proactive with the Comprehensive Guide to Cyber Ranges. Learn how high-fidelity simulated environments empower security professionals to train, test, and respond effectively to evolving threats.

pdf Download (434 KB)

Enterprise adoption of MFA has become the best tool to fight presentday ransomware attacks by protecting administrative accounts and in interrupting the movement of attacker across your corporate network.

ss pdf Download (627 KB)

With the SimSpace Cyber Force Platform, CISOs and their teams can put their tools and processes to the test, continually improve organizational security posture, demonstrate compliance and ensure a seamless customer experience.

d pdf Download (1.31 MB)

The importance of reputation and resilience in cybersecurity

Log in

Please Login to download this file

Username *
Password *
Remember Me
Go to top