Security Innovation is proud to be a National Cybersecurity Awareness Month Champion, dedicated to helping make companies more secure from administrators and developers to IT Security Managers and CISOs.
If you already know all about protecting your privacy and security online, this webinar may NOT be for you.
But if you are unsure how best to protect yourself and your family online, you'll want to register - and share with others!
You will learn:
Let Security Innovation show you 4 quick & easy ways to enhance your online safety. In this tip sheet, we cover:
IoT devices are proliferating our homes, from smart thermostats, light switches, security cameras, even refrigerators, our homes are becoming even more "connected." With these connections, comes security risk. How do you minimize these risks to help protect your home and your family? Read more...
You can install firewalls, restrict access to certain sites, monitor apps on their phone, but that won’t get to the real underlying issues. Becoming aware of security concerns and safety measures, you can start the conversation with your kids and ultimately instill safe browsing habits.
Download our infographic, Talk to Your Children About Online Security to help start the conversation today!
Written by Joe Basirico, SVP of Engineering, this white paper covers what it takes to become a great security tester. Using his years of experience examining and training development teams, Joe has come up with three pillars that every security testing foundation must have:
In this quick 2-minute video, we'll discuss the difference between Stored and Reflective Cross-Site Scripting (XSS) attacks and what you can do to avoid them.
What You Really Need to Know
In this quick 2-minute video, we'll go over the basics of SQL injection - what it is, how it can impact your code and organization, and what you can do to protect yourself against it.
By Lisa Parcella
October is National Cyber Security Awareness Month and week-two brings us an interesting and very relevant topic. Millions of Rewarding Jobs: Educating for a Career in Cybersecurity.
We can all reap the technological and societal advancements that occur when we diversify the talent pool and bring new and fresh perspectives to the challenges in front of us.
CLICK TO READ
cul•ture | \’kәl-chәr\ noun the set of shared attitudes, values, goals, and practices that characterizes an institution or organization.
A strong culture of cybersecurity can complement and work with procedural and technology controls to help organizations be proactive as they build secure software, systems, and networks – as well as help detect and stop potential attacks.
This paper discusses the importance of a strong culture of cybersecurity, and examines ten key activities for building – or improving – that culture within your organization. Download to learn:
Download the Application Security Report and learn about the state of application security, how organizations are protecting their applications, and what tools and best practices IT cybersecurity
teams are prioritizing to find, fix and prevent
vulnerabilities in next-gen apps.
Despite software being the primary target of attacks, organizations still fall woefully short with even basic security hygiene:
53% lack significant resources to detect and remediate application vulnerabilities
42% blame "rushing to release” for not establishing secure coding procedures
Based on a comprehensive online survey of IT and cybersecurity professionals in the 400,000-member Information Security Community on LinkedIn, the 2018 Application Security Report has been produced in partnership with Security Innovation.
Security in the Workplace is the NCSAM focus this week. Security Innovation is dedicated to help keep everyone safe online whether it is at home or in the workplace. We strive to make security approachable, fun and interesting through training resources and courses for various roles at your company. Teaching best practices for securing online users is a priority to us whether it is at home or in the workplace.
The NIST Cybersecurity Framework was created with the realization that specific controls and processes have already been covered and duplicated in existing frameworks, and that organizations needed high-level guidance for improving their cyber security defenses.
This tip sheet will break it down into 6 easy steps for compliance as well as recommended courses under each of the 5 NIST Cybersecurity Frameworks. The steps are as follows:
1. Categorize Information System
2. Select Security Controls
3. Implement Security Controls
4. Assess Security Controls
5. Authorize Information System
6. Monitor Security Controls
or any other compliance standard, Security Essentials provides a framework for creating security assessments, authorizations, policies, and procedures across the enterprise and provides critical, high-level guidance for those responsible for the implementation of information systems for security controls, such as Architects, Managers, Policy Writers, Facilities Personnel, IT Operations and more!
Below is a list of all of our Security Essentials courses.
Those included in our NCSAM trial* are in bold.
*You must register by 10/31 to get access to the Security Essentials trial for 7 days.