New tools appear in ongoing social engineering campaign, Mad Liberator ransomware targets AnyDesk users, and Bitdefender explores the evolving cybercriminal underground.
Welcome to this new Tanium certifications series! Today's show will give you an overview of the Tanium certification program, the steps to register, get trained, and sit your exams. Then you'll find a coming episode focusing specifically on each exam.
Welcome to this installment of the Tanium certification series. Today we're looking at the entry level Tanium Certified Operator exam, the TCO. As with other exams in this series, I've invited one of the experts who helped write the exam questions to give us an insider's look at what is covered and to help you prepare.
Welcome to this installment of the Tanium certification series. Today we're looking at the entry level Tanium Certified Administrator exam, the TCA. As with other exams in this series, I've invited one of the experts who helped write the exam questions to give us an insider's look at what is covered and to help you prepare.
Join us for part one of Tanium Public Sector’s first episode of our To the Point government thought leadership interview series as we sit down with Leah McGrath, executive director of StateRAMP, to discuss how the nonprofit helps governments and cloud and security service providers achieve and maintain security compliance.
Join us for part two of Tanium Public Sector’s first episode of our To the Point government thought leadership interview series as we continue our dialogue with Leah McGrath, executive director of StateRAMP, as she delves into best practices for standardization, continuous monitoring and more.
SharpRhino RAT threatens IT admins, ransomware gangs ramp up pressure on targets, and a new phishing scam leverages Google Drawings and WhatsApp links.
With Tanium Automate, your IT and security team can easily create custom playbooks – with little to no code – to automate any IT challenge. Automate’s orchestration capabilities keep your team informed and in control, so that changes can be rolled out into your environment with confidence and certainty.
Cisco Talos releases its Q2 IR trends report, ransomware groups target ESXi flaw, and scammers exploit GenAI in domain registration and network attacks.