EVENTS

Cyber Threat Hunting for Uncategorized Proxy Events

This post was originally published here by Chris Sanders. Attackers rely on the abstraction provided between domains and IP addresses to make their infrastructure more resilient. A domain name can be registered in a matter of minutes, and multiple domains can be configured to point to the same host. This allows attackers to quickly switch […]

SO WHAT MAKES (ISC)² EVENTS DIFFERENT FROM THE REST?

This post was originally published here by  (ISC)² Management. Whether it’s Congress, a two-day Secure Summit, or a one-hour webinar, the experience is a product of the (ISC)² Community By Tisun Rustem, Senior Events Manager in EMEA, (ISC)² With so many industry events and online educational opportunities vying for your attention, particularly in information or […]

Share this page