Category

Cybersecurity Leader Searches the Globe for Its Next Top 100 Hall of Fame Recipients

June 17, 2022, Tampa, Fla.,: Only the best of the best will be selected for this year’s Certified Ethical Hacker (C|EH) Hall of Fame. One hundred cybersecurity professionals from around the globe who have successfully mastered EC-Council’s C|EH training and scored over 90% on the C|EH exam will be considered for this prestigious honor. Invitations are sent by email to those individuals who have not only excelled in their coursework and on the C|EH exam but are leaders within their communities and auxiliary organizations.

Read article
Top SIEM Tools for SOC Analysts

A cursory look at 2021’s cyberattack statistics shows that organizations need the help of trained, certified security operations center (SOC) analysts who know how to effectively use the latest tools and techniques, including security information and event management (SIEM) platforms.

Read article
What Is Threat Modeling?

What Is Threat Modeling? Data breaches cost companies USD 8.64 million on average (Johnson, 2021), but many companies report they don’t have adequate protection against these vulnerabilities because there aren’t enough IT security professionals to help. The shortage of cybersec

Read article
Preventing Malicious Hacks with Port Scanning Techniques

Port scanning techniques are a valuable part of any cybersecurity professional’s toolkit. Ethical hackers and penetration testers frequently use port scanning techniques to locate vulnerabilities in a network that malicious hackers can use to gain access. Port scanning is a fundamental part of the pre-attack phase of a penetration test.

Read article