MAS announce new rules in singapore - what does... 22 Jan 2021 your organisation's digital footprint could be vulnerable to cyberattacks. Find out how to protect your organisation with penetration... Read more
VM Detection Tricks, Part 1: Physical memory resource maps 20 Jan 2021 In this series we’ll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021.... Read more
ICAST - global regulatory frameworks compared 7 Jan 2021 Find out how the iCAST regulatory framework set out to achieve the objective of increasing the Hong Kong... Read more
PoshC2 Improved HTML Reports 6 Jan 2021 Red team operators need detailed and accurate C2 report output in order to conduct high quality work. Consequently,... Read more
The fireeye hack 15 Dec 2020 With the recent hack of FireEye, there have been many questions circulating among cyber security experts and the... Read more
How security awareness training can reduce the risk of... 11 Dec 2020 In this blog post, we'll talk about some of the key things you should be considering to help... Read more
What is alarm fatigue in cyber security? 7 Dec 2020 Find out what alarm fatigue is in cyber security and how an absolutely key element of the process... Read more
Evidencing cyber security measures in ship architecture 3 Dec 2020 With cyber attacks increasing by 900% on the maritime industry over the last 3 years, it's never been... Read more
CVE-2020-14418: madCodeHook Library Local Privilege Escalation 1 Dec 2020 Nettitude discovered a vulnerability in the ‘madCodeHook’ third party library which caused a number of security products, including... Read more
SOC alerts - reducing false positives and negatives 26 Nov 2020 It is essential to ensure that the performance and efficiency of your cyber security alerting system are reviewed... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*