article thumbnail

Q&A: How certifying in-house IT staffers as cyber analysts, pen testers can boost SMB security

The Last Watchdog

Related: The ‘gamification’ of cybersecurity training. Ransomware, business email compromises and direct ACH system hacks continue to morph and intensify. LW: How do CompTIA’s training programs and certifications come into play? The exposure faced by SMBs is profound.

IT 103
article thumbnail

How to Perform a Vulnerability Scan in 10 Steps

eSecurity Planet

If the changes are considerable, it is critical to update the scanning tool’s vulnerability knowledge base with the most recent information. Develop and implement suitable remediation procedures in collaboration with key stakeholders such as system administrators, network engineers, and security teams.

article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

I even got some training on the side from Google and others. Training is important. I’m reminded of when I trained to use Kali Linux. And without follow up training, it’s hard to really know what’s included. Because those are the same behaviors that real users real administrators are using.