Nov
20
Red team tactics are at the heart of cyber security with organizations around the world offering rewarding, high-salary careers to ethical hackers who understand the importance of penetration testing. No matter where you’re at in your InfoSec journey, there’s an INE cyber security learning path for you. Here’s a look at our red team training, all included with your Cyber Security subscription. Read More
Nov
19
What is Malware Analysis? Malware analysis is the art of dissecting malicious software with the objective of answering three core questions: Read More
Nov
04
HONEST Security’s Amber Holcomb discusses innovations in Internet of Things connected devices and how to keep IoT safe from cyber criminals. Amber Holcomb is Director of Operations at HONEST Security. She is passionate about encouraging and supporting young women in STEM and empowering women in the tech industry.  Read More
Oct
22
Today’s breaches continue to start with compromised email accounts, with monetary gain remaining the top motivation for stealing login credentials. Typically, these are opportunistic attacks, a sort of spray and pray tactic. According to ProofPoint’s report Human Factor 2019, 25% of phishing emails in 2018 were generic credential harvesting. Phishing is the number one attack vector, mainly because social engineering is still a wildly successful way to compromise users because so many people... Read More
Oct
14
October is Cyber Security Awareness Month. Today we're discussing what  a Business Email Compromise is, and why cyber security professionals should care.  Read More

Subscribe to INE Blog Updates

New Blog Posts!