Just how in the heck does a cybersecurity professional stay on top of the rapidly evolving threat landscape, the ever changing attacks and exploits, and new security solutions? I can assure you it involves a lot of reading.
Last month the Twin Cities chapter of (ISC)2 held a meeting on the topic of trusted sources for threat intelligence. It seemed like a great topic idea, so I decided to share my list ...
Continue Reading →DEC