Browsing Category
Whitepapers
Application security: Anticipate the threat to reduce costs and guarantee business…
73% of security incidents concern a web or mobile application. 1 How safe is your corporate data? Hackers have!-->…
Spear Phishing Understand, Analyze and Prevent
Phishing is a social engineering technique that aims to deceive people into unknowingly providing their personal!-->…
DISTRIBUTED DENIAL-OF-SERVICE (DDoS) ATTACKS: AN ECONOMIC PERSPECTIVE
While network security experts disagree on when the first Distributed-Denial-of-Service (DDoS) attack occurred, it!-->…
THE COST OF DDoS ATTACKS
At Cogeco Peer 1, we host over 8,000 customers, of whom 600 are e-commerce businesses. We fight distributed!-->…
Cybersecurity Dossier – a post malware age reality
The threat landscape is constantly evolving and threat actors today are more sophisticated, innovative, motivated!-->…
How to Play Your Role in Cybersecurity
For many agencies, cloud computing is a vital component of their IT strategy because it provides the flexibility!-->…
CYBER SECURITY RESOURCE PLANNING
CSRP defines organization cyber risks, priorities, technical mitigation tasks, individual responsibilities,!-->…
LTI’s Threat Hunting Service
Traditional security monitoring is proving to be insufficient in today’s fast-paced digital world of Cloud,!-->…
Top 6 Security Use Cases for Automated Asset Inventory
Automated asset inventory might not be the first thing that comes to mind when considering cutting-edge security!-->…
After the Windows 11 update, is it still worthwhile to pursue the CEH v11 course?
You've come to the correct place if you're having trouble deciding whether to enroll in the CEH v11 course right!-->…