Articles on Training
- Social Networking Joining The Information Security Community on Twitter
- Malware Combating Malware in the Enterprise
- Incident Response Could a Data Breach Actually Help the Affected Brand? Research shows negative publicity can increase awareness for relatively unknown brands—negative book reviews increased sales for unknown authors. For breaches unrelated to a company's core purpose,...
- Training Professional Certifications and the Seductive Power of Similarity Professional certifications act as similarity signals that help people "click"—research shows shared traits (same first name, hometown, interests) double connection likelihood. More exclusive...
- Incident Response The Big Picture of the Security Incident Cycle Incident response doesn't exist in isolation—it connects with intrusion detection, penetration testing, application security, and network defense through a four-phase cycle: Plan, Resist, Detect, and...
- Communication Learning How to Influence - Tips for Security Professionals Security professionals often need to influence colleagues without formal power to affect changes. Success requires not just message content but presentation. Key books on influence include Cialdini's...