Advertise

Advertise

Information Technology: Leading the way

Increased demandSEEK Australia recently revealed the top 20 highest paying industries in Australia with Information Technology topping the leader board at number one. Kendra Banks, Managing Director at SEEK ANZ said: “What we are seeing is that candidates in information and communication technology are more motivated by salary and compensation than those in any other…

How important are soft skills in analytics

The field of data science is vast, and data scientists are expected to be skilled in a range of areas such as machine learning, data visualisation and data mining; at times, it can feel like you are only scratching the surface. It’s impossible to master all the tools and software available, but it’s important to…

Seven Steps to Secure Privileged Access

Gartner released the first-ever Magic Quadrant for Privileged Access Management,1 shining a spotlight on what may be the largest security vulnerability enterprises face today. Privileged accounts, credentials and secrets are “the keys to the kingdom” and they exist everywhere —on-premises, in the cloud, across DevOps environments and on endpoints. Attackers know this, which is why a…

Best phishing lures: 6 of the top 10 real phishes use ‘invoice’ as the subject

Not since the Beatles has a Top 10 chart been dominated like this. According to Cofense Intelligence, the subject “Invoice” appears in 6 of the 10 most effective phishing campaigns in 2018. Not only that, “Customer Invoice” snags the #7 spot. The other 3 winners also pose as financial transactions: “Payment Remittance”, “Statement”, and “Payment”.…

Say “Ah!” A closer look at phishing in the healthcare industry

How resilient is healthcare to phishing? Healthcare is a favorite – and profitable – target for cyberattacks. If you work for a healthcare company, or if you’re a patient or subscriber, you’re familiar with all the data the industry gathers and threat actors crave: name, date of birth, Social Security number, mailing address, email address,…

Phishing-Specific SOAR Gets You to Mitigation Faster

When a malicious email slips past perimeter tech defenses, you need to find it and respond in minutes, not two or three months. But no one has unlimited budget or staffing to sift through phishing alerts, verify threats, and help stop attacks in progress. To analyze and respond to emails faster, CofenseTM adds the power…

Rohyt Belani, CEO, Cofense at RSA Conference 2018

Rohyt Belani, CEO of Cofense, stopped by the SC Media booth at the RSA Conference 2018 to talk about the way Cofense is helping to combat phishing attacks of all types. Take a look at this short video to hear Rohyt speak about how they are training humans to be better at stopping attacks and the…

NTT Security at RSA Conference 2018

SC Media’s Online Editor Doug Olenick sat down with Court Little from NTT Security at the RSA Conference 2018 to discuss the new science of cybersecurity. Take a look at this short video for some insight into NTT Security’s thoughts on the topic.   

Threat Territory

For any infosec professional, threats are as routine as Mondays. But just like everyone’s least favorite day of the week, there are some risks you’re not always ready for.   After a threat-filled RSAC 2017, technology writer and blogger Tony Kontzer is ready to help you up your threat savvy. A culmination of Kontzer’s Conference…

Next post in Advertise