How can banks protect themselves from cyber-attacks? 29 Jan 2021 Do your organisation's current security measures satisfy the following five functions in the event of a cyber-attack? Read more
Introducing FComm - C2 Lateral Movement 27 Jan 2021 Over the past few years, we have found a few edge cases where the traditional lateral movement communication... Read more
AASE - global regulatory frameworks compared 26 Jan 2021 In part four of the 'Global Regulatory Frameworks Compared' series, we'll look at AASE - the cyber security... Read more
MAS announce new rules in singapore - what does... 22 Jan 2021 your organisation's digital footprint could be vulnerable to cyberattacks. Find out how to protect your organisation with penetration... Read more
VM Detection Tricks, Part 1: Physical memory resource maps 20 Jan 2021 In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021.... Read more
ICAST - global regulatory frameworks compared 7 Jan 2021 Find out how the iCAST regulatory framework set out to achieve the objective of increasing the Hong Kong... Read more
PoshC2 Improved HTML Reports 6 Jan 2021 Red team operators need detailed and accurate C2 report output in order to conduct high quality work. Consequently,... Read more
The fireeye hack 15 Dec 2020 With the recent hack of FireEye, there have been many questions circulating among cyber security experts and the... Read more
How security awareness training can reduce the risk of... 11 Dec 2020 In this blog post, we'll talk about some of the key things you should be considering to help... Read more
What is alarm fatigue in cyber security? 7 Dec 2020 Find out what alarm fatigue is in cyber security and how an absolutely key element of the process... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*