‘Creating Audit Programs’ White Paper Introduces Template Redesign

‘Creating Audit Programs’ White Paper Introduces Template Redesign

With the release of its white paper Information Systems Auditing Tools and Techniques:  Creating Audit Programs, ISACA describes the basic steps to create an audit program. This white paper is part of a series created to deliver practical guidance on how to perform an audit engagement—from planning to reporting and closing—that is consistent with ISACA [...]

How the EITest Campaign’s Path to Angler EK Evolved Over Time

How the EITest Campaign’s Path to Angler EK Evolved Over Time

In October 2014, Malwarebytes identified a campaign based on thousands of compromised websites that kicked off an infection chain to Angler exploit kit (EK). It was named “EITest” campaign, because “EITest” was a variable consistently found in injected scripts across all of the compromised websites. Malwarebytes noted some changes in this campaign in 2015 and2016. [...]

Top 5 Things to Know Before You Go to Ignite Conference 2016

Top 5 Things to Know Before You Go to Ignite Conference 2016

We are days away from Ignite Conference 2016! Take a look at the top five things you need to know before heading to our biggest security conference of the year. 1. Build Your Agenda Use Agenda Builder to create an event that is customized to your interests. Workshops and sessions are designed to be modular, [...]

Cyber 9/12 Challenge: The Next-Generation of Cybersecurity Experts

Cyber 9/12 Challenge: The Next-Generation of Cybersecurity Experts

Earlier this month, I had the privilege of attending the Cyber 9/12 Student Challenge at American University, sponsored by the Atlantic Council. The Cyber 9/12 Student Challenge is an annual cyber policy competition for students across the globe to compete in developing national security policy recommendations tackling a fictional cyber catastrophe. During the Cyber 9/12 Student [...]

Maximizing your Panorama Deployment, Part 1

Maximizing your Panorama Deployment, Part 1

Are You Maximizing Your Panorama Deployment? Like most network administrators, you are concerned with manageability, streamlined operations, and ensuring your network security deployment is bulletproof. In this three-part blog series, I’ll address those concerns by sharing the benefits of moving to a network security management solution such as Panorama and explain how you can maximize [...]