As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems…
Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out targeted phishing emails to…
Few messages strike fear in the hearts of IT operations staff like the dreaded scan results from your security team. These messages often appear in your inbox early on Monday…
When you hire someone, you expect them to care about your business. You want them to take care of your intellectual property and data. Unfortunately, not everyone has the best…
As the cyberlandscape continues to evolve, so do the methods of attack used by cybercriminals. And it isn’t just outsiders you have to worry about; insiders can be responsible for…
Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip…
We made it! This is the final post in this six-part series mapping the cybersecurity landscape through a new reference model for IT infrastructure security. Thank you for coming along…
Today, in the fifth post of this six-part series, we’re going to cover the fourth and final domain of our reference model for IT infrastructure security. Not only is this…
Where are you? Halfway through this 6-part series exploring a new reference model for IT infrastructure security! As you learned in earlier posts, this model breaks the security infrastructure landscape…
So far in this series we have reviewed a few popular and emerging models and frameworks. These tools are meant to help you make sense of where you are and how…