How-Tos

red team vs. blue team

mtt 007 howtobulkdeletephotos
video

How to bulk delete iPhone photos

Here are the fastest and easiest ways to bulk delete photos from your iPhone.

mtt 006 howtodeleteiosapps
video

How to delete iOS apps

Here are the best ways to delete unwanted iPhone and iPad apps from your device.

00 title awareness training

4 tips to make use of Wannacry in awareness programs

When security events make news, you can take advantage of the wake-up call — if you know what to do.

Android_Phone
video

How to Back Up and Transfer your Stuff to a New Android Phone

Getting your data from an old Android phone to a new one isn't hard, but you'll want to follow these steps.

1 incident response police tape crime death

10 steps for a successful incident response plan

Incident response plans are often left unused, leaving firms far less able to detect and respond to cyber attacks or data breaches. Here’s our 10-point plan to ensure you set up -- or improve -- an IR plan that actually works.

pht 069 windows10isofile v1.00 01 14 07.still001
video

How to download a Windows 10 ISO file

Putting an ISO file of Windows 10 on disc is your insurance against PC troubles. Here's how to get it.

v1.00 01 48 20.still001
video

How to make a Windows 10 bootable USB drive

Microsoft makes it easy, assuming you have a Windows 10 license. You do, don't you?

crisis management meeting

8 ways to manage an internet or security crisis

IT, communications and security experts share tips on what to do when your business is hit with an IT-related disaster, such as a cyberattack, an ecommerce site crash or a software failure.

three check marks blackboard list

Wanna stop WannaCrypt? Don't pay ransoms, backup data, and train employees

Top 3 things for CISOs and IT security teams to do in response to the WannaCry ransomware outbreak.

1 incident response police tape crime death

Incident response is like tracking down a perpetrator

What is incident response? Larry Zulch, President & CEO, Savvius, walks us through the crime scene.

0 iot intro smart appliances

Six things you need to know about IoT security

It’s in every company’s best interest to “do” IoT correctly, which will mean ratcheting up security measures to capture and ensure a good customer experience. Jack Nichols, director of product management at Genesys, proivdes six ways...

1 tracking hunting dogs horse

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be taken to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses'...

0 intro strikeout baseball

How to strike ransomware out

Carbonite created this list of 10 important ransomware prevention tips and best practices.

3 sensitive data hacker phone

How can CSOs protect their CEO?

CEOs have a high level of visibility outside the organization and attackers can leverage the data they collect as a way to target them for cybersecurity attacks. Organizations can help protect your CEO from cybersecurity attacks by...

Windows Defender: Creators Update
video

Windows Defender: What changes in Windows 10 Creators Update

Windows Defender gets organized in the Creators Update, bringing formerly scattered features under one roof. See how it’s changed here.

Shooting Video on the iPhone with Edelkrone PocketSKATER2
video

Shoot better iPhone video with handy tools and a better app

The iPhone is a great little camera, but with add-on lenses, the right stabilization, and an app that unlocks manual control, you’ll be thanking the Academy in no time.

1 measure roi

10 ways CSOs can achieve ROI on a network solution

Setting up and protecting the network infrastructure is a major challenge and needs to be even more sophisticated and dynamic than ever before. Here are 10 points that need to be considered to achieve ROI and deliver payback

1 buying decision

9 questions to ask when selecting application security solutions

Organizations need to determine the right tools to stay relatively risk free. Open source security vendor Black Duck explains why asking these key questions can help you determine the right mix of application tools and capabilities...

Load More