- Leadership Joining Axonius to Tackle Cybersecurity Asset Management
IT asset management is a foundational security challenge that organizations increasingly struggle to address as modern paradigms like DevOps, IoT, and BYOD complicate tracking systems, devices, VMs,...
- Authentication Cybersecurity Advice for Political Campaigns
Political campaigns face attacks from cybercriminals and nation-state actors who steal credentials, intercept communications, and exploit weak IT configurations. Countermeasures include enabling...
- Malware Analysis How to Get and Set Up a Free Windows VM for Malware Analysis
Setting up a malware analysis lab requires virtualization software, a Windows virtual machine, and the right tools. Microsoft offers free Windows 10 VMs that expire after 90 days, and utilities like...
- Training A Cybersecurity Writing Course for You
Strong writers find openings to their readers' hearts and minds by knowing how to structure and present content. Techniques like strategic use of headings, lists, and figure captions can help...
- Malware The Language and Nature of Fileless Attacks Over Time
The term "fileless" originated in 2001 to describe malware that existed solely in memory, but has expanded to encompass malicious documents, scripts, living-off-the-land techniques, and memory...
- Malware Making Sense of Microsoft's Endpoint Security Strategy
Microsoft is pursuing three endpoint security objectives: protecting the OS through baseline measures, motivating other vendors to innovate beyond commodity controls, and expanding enterprise revenue...