What is zero trust architecture (ZTA)? Pillars of zero trust and trends for 2024

Explore the essentials of Zero Trust Architecture, its impact on cybersecurity in 2024 and how it shapes modern digital security strategies.

A deep dive into network security protocols: Safeguarding digital infrastructure 2024

Explore the vital role of network security protocols in safeguarding digital infrastructure in 2024, covering types, trends and best practices.

Asset mapping and detection: How to implement the nuts and bolts

Learn how to approach asset mapping and detection.

The Pentagon goes all-in on Zero Trust

With a four-year deadline to meet, how will the military and defense sector respond to the Pentagon’s zero-trust mandate?

How to configure a network firewall: Walkthrough

Learn the basics of configuring a network firewall in this episode of Cyber Work Applied featuring Infosec Skills author Mike Meyers.

4 network utilities every security pro should know: Video walkthrough

When can a certain network utility do the most good for you? Learn how and when you can use Ping, Netstat, Traceroute and ARP in this video.

How to use Nmap and other network scanners

Learn how to use free network scanning tools like Nmap, Zenmap and Advanced Port Scanner in this episode of Cyber Work Applied.

Security engineers: The top 13 cybersecurity tools you should know

Security engineers utilize a range of tools to prevent cyber threats. These are the top 13 tools security engineering industry leaders are using now.

Converting a PCAP into Zeek logs and investigating the data

Learn how to better understand the Zeek log file structure and how to use the logs when investigating events.

Using Zeek for network analysis and detections

Learn about how to use Zeek, a free, powerful open-source network traffic analyzer.