Building a Cyber Threat Hunting Team: Methods, Strategies and Technologies

Cyber threat hunting combines strategies, advanced technologies and skilled analysts to methodically examine networks, endpoints and data repositories. Its objective is to uncover stealthy malicious activities, reduce dwell time for undetected threats and bolster an organization’s capability to withstand multi-vector attacks. This TechRepublic Premium article, written by Franklin Okeke, aims to look at threat hunting …

Read More

9 Must-Do Tips to Secure Ubuntu Server

In today’s world, if you’re not constantly working to secure your servers, you’re already 10 steps behind every hacker on the planet. And if you happen to be a Linux systems administrator, you might think it doesn’t apply to you. It does. Even though the Linux open source platform is considerably more secure than many …

Read More

Best of KB4-CON 2024: The State of Phishing, Hacking and Security Awareness Training

We know what went on at security awareness training vendor KnowBe4’s seventh annual KB4-CON user conference in Florida. From March 4-6, close to 1,700 people heard about cybersecurity matters and the two-edged sword that is artificial intelligence. Let’s face it, AI greatly enhances cybersecurity defenses while simultaneously arming cybercriminals with more potent tools. In this …

Read More

Comparison Chart: VPN Service Providers (Free Download)

Selecting the right virtual private network provider for your needs requires a fair bit of legwork because the choices are many and the offerings vary greatly. This quick-glance chart from TechRepublic Premium is blank and to be filled in by the user. The idea is to round up the top contenders and compare them across …

Read More

Perimeter Security Policy

As the saying goes, a chain is only as strong as its weakest link. This applies more than ever to cybersecurity implementations designed to protect organizations from malicious attacks, intruders and vulnerabilities. While security principles should apply throughout the organization, locking down the perimeter and ensuring only necessary connections get through is an especially critical …

Read More

10 Must-Read Books on Cybersecurity

In a world fraught with cyberattacks and privacy violations in both business and individual spaces, cybersecurity remains a veritable tool for curtailing these attacks and improving privacy practices. But how can we put cybersecurity to good use without having a strong knowledge of cybersecurity? This list of books, recommended by Franklin Okeke for TechRepublic Premium, …

Read More

GDPR Security Pack

One of the key requirements of the General Data Protection Regulation is a demonstrated effort to enforce security measures that safeguard customer data. This bundle from TechRepublic Premium comprises six policies you can customize and implement to help your organization show good faith toward providing those data protections. The following policies are included: Data Classification. …

Read More

Hiring Kit: Cyber Threat Hunter

Professional cyber threat hunters complement cybersecurity programs focusing on potential threats and vulnerabilities that may breach automated cybersecurity tools and traditional systems. These hunters proactively search for previously unknown or ongoing threats by using their deep understanding of cybersecurity and how cybercriminals operate. This hiring kit from TechRepublic Premium provides a workable framework you can …

Read More

Top Cybersecurity Predictions for 2024 (Free Download)

While artificial intelligence discourse and chatbots dominated 2023, the cybersecurity space still pulled our attention now and then with cyberattacks, reminding us that technology advancements without cybersecurity can be counterintuitive, an approach akin to setting the cart before the horse. With this in mind, TechRepublic Premium spoke with a wide range of experts to find …

Read More

SMB Security Pack

Small and midsize businesses are increasingly being targeted by cybercriminals — but they often lack the resources and expertise to develop comprehensive security policies to help defend against threats. This set of policies from TechRepublic Premium will help your company establish guidelines and procedures to reduce the risks. The pack comprises seven documents: IT Staff …

Read More
X