The State of Stalkerware in 2019
This report examines the use of stalkerware and the number of users affected by this software in the first eight months of 2019.
The State of Stalkerware in 2019 Read More »
This report examines the use of stalkerware and the number of users affected by this software in the first eight months of 2019.
The State of Stalkerware in 2019 Read More »
Global report – Looming cyber threat in mining paves platform for change: Through interviews, survey and deep analysis of Australia’s largest mining and service companies, including BHP, Rio Tinto, South32, and Anglo American, the report has uncovered that 98% of top-level executives expect a catastrophic event is required to drive an industry response to cybersecurity in mining.
State of Play Cybersecurity Report Read More »
The report details the attitudes and beliefs of those in charge of cybersecurity, and tracks how they are faring against sophisticated and pervasive cyber attacks.
2019 CrowdStrike Global Security Attitude Survey Read More »
Findings show that the legal industry has a good grasp on the issues and practices required to maintain secure digital systems, but there is still some way to go. There must be an ongoing focus on the people, processes, and technologies of businesses in order to build and maintain good cyber resilience – and this can only be achieved through greater education and awareness-building at all levels of the organisation.
2019 LexisNexis Decoding Cybersecurity: Clause and Effect Roadshow Report Read More »
‘Tis the season for cyberattacks, particularly when it comes to the retail industry.
Cynet has released the results of its 2019 survey of cybersecurity professionals, examining pay rates measured against employee achievements, education, skills and more.
2020 Cybersecurity Salary Survey Results Read More »
The Network Application and Configuration (CNAC) course provides students a fundamental understanding of how to establish, enhance, and enable organizational networks. Students will work with real networks in real environments and will leverage real tools, techniques, and skills to complete tasks in a cybersecurity environment.
Cybersecurity Nexus (CSX) – Network Application and Configuration (CNAC) Read More »
The Penetration Testing Overview (CPTO) course provides students an introductory understanding of penetration testing and ethical hacking. Students will work with real systems in real environments and will leverage real vulnerability analysis and exploitation tools in a live environment.
Cybersecurity Nexus (CSX) – Penetration Testing Overview (CPTO) Read More »
The Packet Analysis Course (CPAC) provides students an understanding of packet and protocol analysis. Students will work with real network traffic captures in real environments and will analyze different communication types and their components.
Cybersecurity Nexus (CSX) – Packet Analysis Course (CPAC) Read More »
The Vulnerability and Exploitation Course (CVEC) provides students, who possess a basic understanding of penetration testing, a deeper understanding of vulnerability identification and exploitation capabilities. Students will work with real systems in real environments and will leverage real vulnerability analysis and exploitation tools in a live environment.
Cybersecurity Nexus (CSX) – Vulnerability and Exploitation Course (CVEC) Read More »