How to Select Analytical and Architectural Tooling

Tooling discussions are often driven by hype on the side of those pushing tool sales and adoption and by angst on the part of those who prefer working with a familiar platform. But this dynamic shouldn’t obscure the fact that a good toolset is key to getting the most value out of your analysts and architects.

Read more

Certified Ethical Hacker v8: Network Defense on the Offense

The majority of information security education emphasizes the definition and application of best practices. First, a network or system administrator needs to understand the proper application and configuration of network and security devices: routers, switches, firewalls, intrusion detection/prevention systems, and honeypots. A good start with strong IT policies facilitates the implementation.

Read more