Generic filters

Analysis

Global Resilience Survey 2020

Foreword We can all agree that 2020 has been a turbulent year. It has provided a host of new challenges and opportunities for organisations across the globe and it has radically changed our risk landscape. Many organisations have acknowledged both the pros and cons of our adjusted reality and are actively updating their business strategy. …

Global Resilience Survey 2020 Read More »

NIST Cloud Computing Forensic Science Challenges

The National Institute of Standards and Technology (NIST) has been designated by the Federal Chief Information Officer (CIO) to accelerate the Federal Government’s secure adoption of cloud computing by leading efforts to develop standards and guidelines in close consultation and collaboration with standards bodies, the private sector, and other stakeholders. Consistent with NIST’s mission, as …

NIST Cloud Computing Forensic Science Challenges Read More »

2019 Trustwave Global Security Report

Trustwave has released the 2019 Trustwave Global Security Report, which reveals the top security threats, breaches by industry and cybercrime trends from 2018. Analysis of Data Breach Investigations, Internal Threat Intelligence and Security-Based Telemetry Reveals Cybercriminals are Becoming More Methodical and Adaptive.

RSA Quarterly Fraud Report, Q3 2019

The report represents a snapshot of the cyber fraud environment across the globe, providing actionable intelligence to consumer-facing organisations of all sizes and types to enable more effective digital risk management.

Cybersecurity Nexus (CSX) – Packet Analysis Course (CPAC)

The Packet Analysis Course (CPAC) provides students an understanding of packet and protocol analysis. Students will work with real network traffic captures in real environments and will analyze different communication types and their components.

Cybersecurity Nexus (CSX) – Forensic Analysis Course (CFAC)

The Forensic Analysis Course (CFAC) provides students with an understanding of forensic documentation and data recovery methods. Students will work with forensic restoration and case management tools in order to simulate a real-world forensic intake scenario.