In 1996, the U.S. Federal Bureau of Investigation (FBI) launched a program named InfraGard to develop physical and cyber threat information-sharing collaborations with the private sector. Recently, a database containing contact details of over 87,000 members of InfraGard was posted on BreachedForums, a cybercrime and hacking forum which surfaced as an alternative to the now-defunct now-seized…
Read more
How to Perform a Network Audit
What Is network auditing? Network auditing refers to the process of gathering, analyzing, and studying network data, with the purpose of assessing the network’s health. Network auditing gives businesses insight into how successful their network control and management operations are, particularly regarding both internal and external compliance regulations. https://www.n-able.com/blog/how-to-perform-network-audit
Read more
ENISA THREAT LANDSCAPE 2022
This is the tenth edition of the ENISA Threat Landscape (ETL) report, an annual report on the status of the cybersecurity threat landscape. It identifies the top threats, major trends observed with respect to threats, threat actors and attack techniques, as well as impact and motivation analysis. It also describes relevant mitigation measures. This year’s…
Read more
NIST – Guide to Computer Security Log Management
A log is a record of the events occurring within an organization’s systems and networks. Logs are composed of log entries; each entry contains information related to a specific event that has occurred within a system or network. Many logs within an organization contain records related to computer security. These computer security logs are generated…
Read more