
Threat Hunting Workshop
The Threat Hunting Workshop: An educational workshop explaining the tools, techniques and procedures used by adversaries and how to detect and contain these types of attacks
The Threat Hunting Workshop: An educational workshop explaining the tools, techniques and procedures used by adversaries and how to detect and contain these types of attacks
The Threat Hunting Webinar: An educational webinar explaining the tools, techniques and procedures used by adversaries and how to detect and contain these types of attacks
From the integration with CloudKnox, AWS IAM Access Analyser is a new function that analyses resource policies to help administrators and security teams protect their resources from unintended access.
Reports this week have announced that computers at the DCH medical centres have been infected with ransomware. Three hospitals that make up the group in Alabama were closed to new patients as the attack paralysed the health network’s computer system.
Over two years ago the first that many of us heard about this was when it was announced that a number of NHS Trusts were experiencing some kind of cyber-attack.