Security Management Resources

Learn how to make faster, smarter security decisions with our security management resources

These security management resources share best practices, guide you through successful implementations and help you understand the power of truly knowing your threat and risk posture.

Featured Content


Credentials Are the New Exploits: How to Effectively Use Credentials in Penetration Tests

Credentials have become the number one attack methodology, according to the Verizon Data Breach Investigations Report. Mirroring the increased use of stolen credentials by attackers, 59% of penetration testers focus more than half of their security assessments on credentials versus exploits, according to a 2014 survey. The biggest challenge often rests in effectively managing the large number of passwords, hashes, and SSH keys. Register for this live webcast to learn the trends that cause attackers to increasingly use credentials and learn how you can use Metasploit pro to simulate credential abuse.

Latest Resources

User-Based Attacks – The Kill Chain: From Compromising User Credentials to Exfiltrating Data

The Verizon Data Breach Investigations Report 2014 (DBIR) identifies stolen credentials as the number one most-used attacker method. Your users are under attack, or will be under attack, and in some cases, will become compromised one way or another. In this whitepaper, we’ve mapped common attacker behaviors to what we call "the user-based attacks kill chain." Download our whitepaper on the user-based attacks kill chain to arm yourself and your team with the knowledge you need to stop an attacker in their tracks.

Ten Tips for Detecting Malicious and Compromised Users

According to the Verizon Data Breach Investigations Report (DBIR) of 2014, compromised credentials are now the most commonly-used threat action. Stolen credentials were the most prevalent method for breaking into networks. At the same time, compromising user accounts via phishing and social engineering techniques was the third-most used attacker tool. As user-based attacks are now more common than ever, you must make detecting them a priority today. To help you build a robust user protection plan, we've assembled 10 tips.