Making a Business Case for Information Security Training
by Reflare Research Team on Mar 17, 2023 6:49:00 PM
While information security training is an absolute necessity for any modern organisation, it can be surprisingly difficult to convince decision-makers to allocate funding, let alone perform a successful rollout.
How to Define the Right Cyber Security Training Objectives and Outcomes
by Reflare Research Team on Feb 19, 2023 6:51:00 PM
Identifying the right talent development areas for your organisation's infosec needs is all about asking the right questions... and listening carefully to the answers.
Do Not Fear The AI - Embrace It
by Reflare Research Team on Feb 3, 2023 7:52:00 PM
As it stands, AI cannot completely replace a competent cybersecurity professional. However, AI can play a positive (yet limited) role in improving our effectiveness, regardless of how society is starting to believe the ultimate disruptor has arrived.
Hard to Verify Claims of Hacking Go Both Ways
by Reflare Research Team on Feb 1, 2023 6:26:00 PM
Cyber espionage tends to morph into an issue of national pride. Anyone in the cyber security sector will tell you that there are a lot of attacks out there which go unreported for fear of receiving reputational retaliation by issuing unprovable blame. First Published 10th March 2020 | …
How to Review and Improve Your Cybersecurity Training Processes
by Reflare Research Team on Jan 17, 2023 7:11:00 PM
Continuously improving your IT security training program is a very noble cause. However, most training leaders do not have sufficient processes in place (beyond what's in their own heads) to drive meaningful and coherent change.
Why TPPs Matter and Attributions Do Not
by Reflare Research Team on Jan 12, 2023 7:13:00 PM
Attribution is hard, and even when done successfully, it's often wrong. Instead, understanding the tactics, techniques, and procedures (TTPs) of threat actors can help you look for indicators of compromise, and help you prepare for future attacks.
How to Condense Your Cyber Security Training Scope
by Reflare Research Team on Nov 23, 2022 7:51:00 AM
The range of IT securities capabilities you can train for is limitless, and some domain areas are more valuable than others. Therefore, the right question is not "What training do you want", but "What training is good for you".
Cybercrime in an Interconnected World
by Reflare Research Team on Sep 13, 2022 1:01:00 PM
Cybercriminals are not confined to one region or culture, but operate throughout the interconnected world to capitalise on evolving opportunities to steal customer data and transfer funds. Published 25th May 2016 | Latest Refresh 13th September 2022 A web that reaches from a pocket in …
Proof of Attack vs Proof of Attacker
by Reflare Research Team on Sep 13, 2022 12:46:00 PM
When a system is said to be under attack, compromised or a breach is suspected and/or detected, given the physical and technical challenges, is it even possible to prove who did it? First Published 15th December 2016 | Latest Refresh 13th September 2022 Sufficient due process to separ …
The Accessible Guide to Penetration Testing
by Reflare Research Team on Sep 7, 2022 7:43:00 PM
For years, penetration testing was viewed primarily as an activity for large and complex companies. Now that it is significantly more accessible, smart (and less sophisticated) businesses are baking it into their business-as-usual activities even as early as the point of their creatio …