Category

EC-Council Attains the Prestigious ANSI/ISO/IEC 17024 Accreditation for the Certified Network Defender Program

Summary: EC-Council’s Certified Network Defender (CND) certification program is the latest to receive the prestigious American National Standards Institute (ANSI) Personnel Certification Accreditation. This is the fourth EC-Council certification to attain the gold standard of personnel credentialing. This affirms that the Certified Network Defender (CND) certification process is conducted in a consistent, comparable, and reliable…

Read article
EC-Council’s CHFI Certification Receives the Coveted ANSI Accreditation

Summary: CHFI is the latest to join the group of ANSI accredited certifications from EC-Council In major efforts to educate, certify, and validate digital forensics experts across the globe, EC-Council’s celebrated certification, Computer Hacking Forensics Investigator (CHFI), has now become more desirable, recently receiving the prestigious ANSI accreditation. EC-Council now adds CHFI to its existing…

Read article
Orange Technical College Partners with EC-Council to Advance Cybersecurity Skills in Orange County, FL

Orange Technical College’s Mid Florida and Winter Park campuses will now offer the globally renowned EC-Council Certified Ethical Hacker (CEH) program as qualified EC-Council Authorized Training Centers. The Mid Florida Campus is one of the most technically advanced training centers in the state of Florida, while the Winter Park Campus is considered to be the…

Read article
ORION and EC-Council Partner to Bring Industry-leading Executive Cyber Security Training to Toronto

ORION and EC-Council bring the globally-renowned executive information security management training Certified Chief Information Security Officer (CCISO) to Toronto, Ontario. The CCISO training workshop is a premium training and certification program that bridges the gap between the executive management knowledge that CISOs need and the technical knowledge that many aspiring CISOs have. Read more…

Read article
Cyber Gaming Expert from Johns Hopkins Applied Physics Lab To Lead EC-Council Research

Global cybersecurity education and services company, EC-Council, today announced the appointment of Tim Rosenberg, a well renowned cyber gamification expert, as the Executive Director of EC-Council Research.“Over the past few years, through research, we have established a strong, educated opinion on what is really needed in the market going forward. One honest realization we came…

Read article
Follow these Top Cybersecurity Professors on Twitter

Cybersecurity professors can have a range of expertise, from architecture, maintenance, and administration to forensic investigation of secure networked systems, a type of infrastructure (with a corresponding set of policies) increasingly necessary for safe operation of governments, businesses, nonprofits and educational institutions of all sizes. Read more…

Read article
Technology Can Be Competitive, but in Malaysia, “Cybersecurity Collaboration” is the Key

It would not be incorrect to say that 2017 caused mayhem for information security professionals. Some of the most brutal cybersecurity meltdowns affected a large number of Internet users. Although Equifax and Yahoo stole the headlines, a number of cybersecurity missteps, like Uber and Deloitte, didn’t go unnoticed.While the cybersecurity breaches left a number of…

Read article
DREAD Threat Modeling: An Introduction to Qualitative Risk Analysis

DREAD Threat Modeling: An Introduction to Qualitative Risk Analysis By 2025, the global cost of cybercrime is projected to reach an estimated $10.5 trillion (INTRUSION, Inc., 2020). With 30,000 websites hacked every day (Bulao, 2022), companies of all sizes need to prioritize cybersecurity. As the prevalence and costs of cybercrime skyrocket, organizations have developed a variety of methods to model cyberthreats and assess cybersecurity risks and vulnerabilities. One of these risk analysis methodologies is DREAD, a threat modeling framework created by Microsoft (Meier et al., 2003). Although Microsoft has since abandoned the model, citing concerns about its subjectivity (Shostack, 2008), it’s still in use today by small businesses, Fortune 500 companies, and the military. What Is the DREAD Model? The DREAD model quantitatively assesses the severity of a cyberthreat using a scaled rating system that assigns numerical values to risk categories. The DREAD model has five categories (Meier et al., 2003): Damage: Understand the potential damage a particular threat is capable of causing. Reproducibility: Identify how easy it is to replicate an attack. Exploitability: Analyze the system’s vulnerabilities to ascertain susceptibility to cyberattacks. Affected Users: Calculate ho

Read article