Information Security Awareness Training

Information Security is a general term used to describe the measures an organization takes to protect the confidentiality, integrity and availability (CIA) of sensitive or confidential information. Information security awareness training is an essential element of any organization’s information security program. Its purpose is to equip staff with the knowledge necessary to help protect the organization’s assets, including client and personnel information. However, some information security awareness training programs barely provide the necessary information to be considered an effective means of ensuring employees understand not only how to protect the organization’s information but why it is important to protect that information.

Spotlight

Infocyte

Infocyte enables organizations to hunt for unidentified security breaches and deny attackers the ability to persist undetected in their networks. Its agentless breach discovery technology assesses network endpoints for signs of post-compromise activity and malware missed by other security measures. Unlike traditional endpoint detection products, Infocyte goes beyond scanning files or searching for known malware (ie. IoCs) by instead focusing on identifying the distinct characteristics of a live, compromised system. We call this approach characteristic-based detection (CBD) and it succeeds in finding previously unknown malware by categorizing active and triggered processes by the unique markers or features associated with malware, operating system manipulation, and/or persistence.

OTHER WHITEPAPERS
news image

GE Gas Power Cybersecurity Portal

whitePaper | October 31, 2022

GE Gas Power has developed a product security program based on industry-leading standards, encompassing end-toend cybersecurity through the entire software development lifecycle in conjunction with engineering, sourcing, and vulnerability and incident response. As part of this program, we have also created the Gas Power Cybersecurity Portal, a central, publicly available resource regarding cybersecurity at GE Gas Power.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

22 Cybersecurity Tips for 2022

whitePaper | June 13, 2022

Many cyber-attacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare and other organizations, preventing critical information and systems for patient care from being accessed, for example.

Read More
news image

Embracing Security Operations in the Educational Sector

whitePaper | December 22, 2022

Nearly every part of the educational sector has fallen victim to a cyberattack, from elementary schools to universities. Securing education is no longer a “nice to have” but a “must do” and is a growing concern among the global educational community. Creating and maintaining effective information security and cybersecurity operations in education comes down to people, processes, and tools. It’s crucial for IT and security leaders across the entire spectrum of educational institutions to find the right balance between the three. While there are success stories of achieving that balance, there’s always more to do to identify, understand, and mitigate cybersecurity risks to these organizations. Establishing and improving existing cybersecurity operations must become a priority.

Read More
news image

Dell PowerScale OneFS: Security Considerations

whitePaper | December 28, 2022

In the age of Digital Transformation, organizations must adapt to modern data requirements and implement new features for the transformation life cycle. Throughout this process, protecting data is vital as it is an organization’s most valuable asset. This document describes how to maintain an aggressive security posture for a PowerScale OneFS cluster and meet industry security requirements.

Read More
news image

State Of Zero Trust in The Enterprise:Shift To Identity-Powered Security

whitePaper | October 27, 2022

Cybersecurity has changed. The attack surface has expanded, thanks to the rapid adoption of cloud applications and services, shift to remote work, and proliferation of mobile devices. Having enterprise systems, applications, and data in one location and relying on layers of security tools and controls to keep attackers out, is no longer sufficient when the bulk of data and workloads now live outside the traditional network. Attackers are also increasingly targeting credentials to appear as legitimate users.

Read More

Spotlight

Infocyte

Infocyte enables organizations to hunt for unidentified security breaches and deny attackers the ability to persist undetected in their networks. Its agentless breach discovery technology assesses network endpoints for signs of post-compromise activity and malware missed by other security measures. Unlike traditional endpoint detection products, Infocyte goes beyond scanning files or searching for known malware (ie. IoCs) by instead focusing on identifying the distinct characteristics of a live, compromised system. We call this approach characteristic-based detection (CBD) and it succeeds in finding previously unknown malware by categorizing active and triggered processes by the unique markers or features associated with malware, operating system manipulation, and/or persistence.

Events