- Assessments Information Security Assessment RFP Cheat Sheet
Effective security assessment RFPs require understanding what's driving the need, ensuring staff availability, and defining realistic timelines and budgets. Key elements include specifying assessment...
- Cheat Sheets How to Suck at Information Security - A Cheat Sheet
A tongue-in-cheek collection of common security mistakes to avoid: deploying products without tuning them, treating all assets with equal rigor regardless of risk, locking down infrastructure so...
- Networking Free Blocklists of Suspected Malicious IPs and URLs
A curated list of free blocklists containing IP addresses and URLs of systems suspected of malicious activity. Sources include DShield, PhishTank, and others—each with different formats, goals,...
- Malware Analysis Free Malware Sample Sources for Researchers
A curated list of free sources where malware researchers can obtain samples for analysis, including MalwareBazaar, Hybrid Analysis, VirusShare, and vx-underground. Most require registration, and...
- Malware Analysis Free Multi-Engine Antivirus Scanning Sites
These free multi-engine scanning services let you check suspicious files against dozens of antimalware tools at once.
- Risk Management The Illusion of Invulnerability in Cybersecurity
Healthcare workers wash hands more often when signs emphasize protecting patients rather than themselves, because people overestimate their own invulnerability but not others'. Security messaging may...