Cybersecurity

  • Cyber Resilience - Preparing for Ransomware and Other Possibilities52:38

    Cyber Resilience - Preparing for Ransomware and Other Possibilities

    Watch Video





  • Now Providing C5 Examinations

    Learn about C5
  • Are Passwords Still Useful?

    Are Passwords Still Useful?

    FIDO's painting a picture where passwords are a thing of the past. Read about their proposed alternative authentication methods and how they will seek to overtake passwords despite some obstacles.

    Read Article
  • Financial Institutions Get Proactive Against Cybercrime: The Sheltered Harbor Initiative

    Financial Institutions Get Proactive Against Cybercrime: The Sheltered Harbor Initiative

    As the cyber landscape grows more complicated, hear from the CEO of Sheltered Harbor regarding their Standard and how their partnership with Schellman will better serve your cybersecurity needs.

    Read Article
  • Do You Need a Ransomware Preparedness Assessment?

    Do You Need a Ransomware Preparedness Assessment?

    Don't want to fall victim to the growing threat of ransomware? Find out how Schellman's Ransomware Preparedness Assessment can help you stay safe from these kind of cyberattacks & their consequences.

    Read Article
  • Understanding the Latest on Mandatory Reporting of Data Security Incidents

    Understanding the Latest on Mandatory Reporting of Data Security Incidents

    With mandatory reporting in the U.S. trending more complex with new proposed requirements and laws, learn about the latest progress along with strategies you can use to prepare for any solid changes.

    Read Article
  • 3 Nation-State Cyber Threats to Protect Yourself Against

    3 Nation-State Cyber Threats to Protect Yourself Against

    With the state of the world as it currently is geopolitically, learn about 3 cyberattacks often used by hostile nation-states and how to bolster your defenses.

    Read Article
  • Latest Security Vulnerabilities Breakdown: February 2022

    Latest Security Vulnerabilities Breakdown: February 2022

    Trying to stay up-to-date on the latest security vulnerabilities? We break down what has been a dangerous February 2022 that has seen the emergence of several new threats.

    Read Article
  • Analyzing macOS on Apple M1 Silicon: A Pen Tester’s Take on Mac Security

    Analyzing macOS on Apple M1 Silicon: A Pen Tester’s Take on Mac Security

    Using MacOS within your corporate environment? Our team tested the latest Apple M1 Silicon - here are our security findings regarding vulnerabilities Mac users face.

    Read Article
  • What is SOC for Cybersecurity and How It Can Help You (and Your Vendors)

    What is SOC for Cybersecurity and How It Can Help You (and Your Vendors)

    Worried about ever-growing cyberthreats? SOC for Cybersecurity can help. Learn more about this examination, who is eligible to get it, and why you definitely should.

    Read Article
  • Strategies for Building a Security Program Around a Multigenerational Workforce

    Strategies for Building a Security Program Around a Multigenerational Workforce

    Different generations are vulnerable to cybersecurity attacks in different ways. Learn how to establish a security program that works for everyone so that your organization is more well protected.

    Read Article
  • How to Catch Mobile Traffic Escaping Burp

    How to Catch Mobile Traffic Escaping Burp

    Testing a mobile application and frustrated watching some traffic slip away from your settings? Learn about a technique that can help stop that from happening so you can capture everything every time.

    Read Article
  • How to Write a Burp Suite Extension

    How to Write a Burp Suite Extension

    Working with Burp and finding that you need a workaround? Learn how to build your own extension and potentially solve your problem.

    Read Article
  • 5 Cornerstones to a Successful Cybersecurity Program

    5 Cornerstones to a Successful Cybersecurity Program

    Five fundamentals organizations should consider when building a comprehensive cybersecurity program

    Read Article
  • Ransomware: It Does Not Have to Hold You Ransom

    Ransomware: It Does Not Have to Hold You Ransom

    Schellman's Michael Redman offers ransomware prevention and recovery measures for organizations

    Read Article
  • Does Zero Trust = Better Audits?

    Does Zero Trust = Better Audits?

    Schellman's Bryan Harper provides an overview of Zero Trust principles and implementation practices

    Read Article
  • SWIFT - Reinforcing the Security of the Global Banking System

    SWIFT - Reinforcing the Security of the Global Banking System

    Read Flipbook
  • HHS Requirement for Security Practices NIST

    HHS Requirement for Security Practices NIST

    Schellman's Debbie Zaller provides an overview of the HHS issued HITECH Act amendment

    Read Article
  • Schellman First Take on the Cybersecurity Executive Order

    Schellman First Take on the Cybersecurity Executive Order

    Schellman's Doug Barbin provides a “First Take” on the new Presidential Executive Order on Improving the Nation's Cybersecurity Yesterday, on May 12th, President Biden issued the “Executive

    Read Article
  • A Guide to SWIFT Cybersecurity Assessments

    A Guide to SWIFT Cybersecurity Assessments

    Read Flipbook
  • Regulatory Landscape Shift: Successful Leaders Take Notice

    Regulatory Landscape Shift: Successful Leaders Take Notice

    Schellman watches closely for the outcome of the first significant enforcement action by the NYDFS under 23 NYCRR Part 500.

    Read Article
  • loading
    Loading More...