This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

Practical Windows Forensics ($31 Value) FREE For a Limited Time

The following is external content provided as a free resource for blog readers.

Over the last few years, the wave of the cybercrime has risen rapidly. Regardless of your level of experience in the field of information security in general, this book will fully introduce you to digital forensics. 

What You Will Learn:

  • Perform live analysis on victim or suspect Windows systems locally or remotely
  • Understand the different natures and acquisition techniques of volatile and non-volatile data
  • Create a timeline of all the system actions to restore the history of an incident
  • Recover and analyze data from FAT and NTFS file systems
  • Make use of various tools to perform registry analysis
  • Track a system user's browser and e-mail activities to prove or refute some hypotheses
  • Get to know how to dump and analyze computer memory

Free offer expires 4/12/17. 



Request Free!

Endpoint Protection Ransomware Effectiveness Report

The following is external content provided as a free resource for blog readers.
It's estimated that in 2016, the cost of ransomware was over $1 Billion, making it the most lucrative criminal business model in the history of malware. Every organization is at risk and with over 33% of businesses experiencing an attack in the past year, it's more important than ever to have adequate protection in place.

For this report, we surveyed businesses across all industries to find out what they're doing to defend themselves. We thoroughly examined who is at risk, what the scope and cost of an attack is, how organizations are protecting themselves from ransomware, and the effectiveness of their endpoint protection.

The results might surprise you!

You will learn more about:
  • The impact of an attack
  • How effective is antivirus against ransomware?
  • What are the best prevention methods?
  • How to strengthen your last line of defense - your users.


Request Free!

Top 6 WAF Essentials to Achieve App Security Efficacy

The following is external content provided as a free resource for blog readers.
To protect yourself against the new wave of cyber threats, you need an ADC with proven security features, such as a WAF, for all your application deployments.

How do you select an ADC solution that will help manage, monitor and secure your entire infrastructure and ensure application security efficacy?

Download “The Top 6 WAF Essentials to Achieve Application Security Efficacy” to learn more.

This eBook identifies ADC WAF considerations for:
  • Testing and validation of application security
  • Application vulnerability prevention and protection
  • Monitoring and troubleshooting of your entire application environment
  • Centralized app delivery management with real-time analytics


Request Free!

Real-Time Active Directory Auditing, Monitoring, and Alerting

The following is external content provided as a free resource for blog readers.
We are under attack! Internal and external threats are constantly attempting to gain access and control over Active Directory. Being able to recognize and be alerted of such attacks is crucial for your organization. Active Directory and security experts Sean Deuby and Derek Melber will give you insights into the problems, attacks, and solutions for how you can monitor and alert on activities that might pose a threat to your overall Active Directory stability.

In this webinar you will learn...
  • Overcome the weaknesses of the out of box Microsoft tools
  • Leverage security log information to generate reports and alerts
  • Develop customized reports and alerts that give you clear insights into potential attacks
  • Gain control over privileged access into Active Directory
  • Receive real-time alerts for key actions that take place in and around Active Directory
  • Understand the attack sequence bad actors use to gain control of your Active Directory


Request Free!

Forrester TEI Study: Value of KnowBe4 Goes Beyond ROI

The following is external content provided as a free resource for blog readers.
The resulting research paper assesses the performance of the KnowBe4 Platform. How does 127% ROI with a one-month payback sound?

At the end of the study, you will have a framework to evaluate the ROI of the KnowBe4 Security Awareness Training and Simulated Phishing Platform on your organization, and how you can leverage your end-users as your last line of defense using KnowBe4.

Download the study now!

Request Free!

Top Cybersecurity Threats in 2017

The following is external content provided as a free resource for blog readers.
Security and risk pros have the challenge of using finite budgets to protect their business from every possible attack type in the threat landscape. One strategy for approaching this challenge is to use historical attack trends to prioritize protections against the most highly probable attacks. This report analyzes common attack patterns responsible for breaches in 2016 to facilitate this approach.

Request Free!

EMA Report Summary: Security Awareness Training

The following is external content provided as a free resource for blog readers.
For the second year in a row, leading IT analyst firm Enterprise Management Associates (EMA), has delved into the world of security awareness and policy training. Their latest research on this topic revealed that a tremendous shift in awareness training programs has taken place, especially in small and medium businesses.

However, attackers are constantly honing their skills and adapting their attack methods, and your employees remain the weak link in your network security.

Get insights into this new research including:
  • Training content is becoming more accessible to organizations of all sizes from both a delivery and cost perspective.
  • Programs are becoming more effective and have better measurement and management capabilities.
  • Due to security awareness training, employees are better at recognizing various forms of social engineering.
  • Apart from layers of security software, security policy and processes are needed to protect business data, and specifically addressing people as a weak link has significant and measurable ROI.


Request Free!

Machine-Learning-Based Analysis and Objectivity: An Uneasy Pairing

The following is external content provided as a free resource for blog readers.
The benefits of discovering patterns and trends traditionally done by humans is well understood, yet machine learning has been embraced in cybersecurity and other fields. But with any hyped technology, the pitfalls aren't so well known. Read this research report to look past the hype and learn the hurdles machine learning must overcome to live up to its full potential.

Request Free!

A Guide to Machine Learning

The following is external content provided as a free resource for blog readers.
It takes an average 200+ days to detect a cyber breach while network data is quietly siphoned. Fear not, machine learning is here—the hot new cyber defense. Unfortunately, it is often misunderstood and harder yet to determine its effectiveness. Read this white paper to understand the two ways machines learn and how to measure their success at detecting unknown malware.

Request Free!

Management Guide for Fighting Cyber Predators

The following is external content provided as a free resource for blog readers.

You need a strategy to deal with the complexity and magnitude of the cyber security issues you face. You need to break your situation into segments that can be dealt with within your available resources. 

This guide examines the follow possible segments in greater detail:

  •  Cyber Exposures (vs cyber risks)
  • IoT
  • Cyber Security Culture
  • Regulatory Environment
  • Cloud Computing
  • Social Media
  • Privacy
  • Education

Learn how to approach cyber security based on the size of your organization and gain access to educational resources with this guide.



Request Free!

Cyber Security Culture Barometer

The following is external content provided as a free resource for blog readers.

It consists of a simple matrix of 10 different aspects of cyber security culture, each having six different descriptions of how an organization addresses that aspect. The descriptors range from outright hostility to cyber security, to totally embracing it. Your choices will determine just how supportive your organization's cyber security culture is to your efforts. The simple scoring table provides a summary assessment. 



Request Free!

Space Weather Outlook March 12, 2017 at 10:44PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-11 2017 March 12 at 8:30 p.m. MDT (2017 March 13 0230 UTC) **** SPACE WEATHER OUTLOOK **** Summary For March 6-12 G1 (Minor) geomagnetic storm levels were observed on 06 Mar due to coronal hole effects. Outlook For March 13-19 No space weather storms are expected for the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

8 Tips to Stay Ahead of Data Protection Trends

The following is external content provided as a free resource for blog readers.

The trend is clear — businesses are under pressure to modernize and go digital, putting IT organizations squarely in the spotlight. In many ways IT is re-inventing themselves to become a business enabler instead of the traditional cost center to provide services and solutions at a speed and efficiency never experienced before. 



Request Free!

Top 5 Pitfalls to Avoid in Your Data Protection Strategy

The following is external content provided as a free resource for blog readers.

As you navigate the new digital age, your data protection strategy needs to be more than just the basics of backup and recovery. With the shifting tides of data center requirements, you must have a data protection solution you can trust your business and career with. 



Request Free!

The Lack of Real-Time Visibility Into Mainframe Events and Security

The following is external content provided as a free resource for blog readers.

The crux of a mainframe security plan is having the data to know what’s going on and what resources are being used in a non-conforming manner. You must know everything that happens—what’s coming in from outside and what’s happening from within—at all times. But there is a lack of real-time visibility to what is happening on today’s mainframes. Because most of the IT world still holds the notion that mainframes are rubber stamped as secure, it’s uncommon for an organization to monitor its mainframes with the same vigilance as the rest of the infrastructure, not to mention that most mainframe events are also monitored separately from the open system technology.

In this paper, we will discuss the role that real-time monitoring can play in an effective plan to secure your entire IT infrastructure, why having a reactive versus proactive event monitoring plan can make or break your potential for creating a truly secure mainframe, and what you can do to better protect your mainframes at all times.



Request Free!

Space Weather Outlook March 06, 2017 at 12:10AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #17-10 2017 March 5 at 9:50 p.m. MST (2017 March 6 0450 UTC) **** SPACE WEATHER OUTLOOK **** Summary For February 27-March 5 G1 (Minor) geomagnetic storm levels were observed on 01--04 Mar due to coronal hole effects. G2 (Moderate) geomagnetic storm levels were observed on 01 Mar from the onset of coronal hole influence. Outlook For March 6-12 No space weather storms are expected for the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Hackproof Your Cloud: Preventing 2017 Threats for a New Security Paradigm

The following is external content provided as a free resource for blog readers.

The cloud offers endless potential for computing, storage, and network infrastructure. However, new opportunities for data management introduce challenges for security. The new security paradigm in an ephemeral, dynamic landscape requires organization to rethink what security means and how they must prevent risks in the future.

In this white paper, you’ll learn:

  • Key differences between on-premise and cloud security
  • Why traditional security tools won’t work in the cloud
  • Considerations for preventing security threats and mitigating risks in the cloud
  • How AWS tools and purpose-built solutions can help improve your security posture


Request Free!