Cybersecurity timelines Past, present, and future

Cybersecurity has come a long way since 1963 when the term "hacking" was first used in the context of cybersecurity. Learn about how cybersecurity has evolved, and what we have in store for the future.

Evolution of cybersecurity:
A brief timeline
Read this blog
The importance of being cyberaware
Watch this video
The evolution of cyberattacks
View our infographic
Ransomware demystified: What security analysts need to know. This e-book includes extensive details about Snake ransomware
Check out our e-book
How to protect your organization from Snake ransomware
Read this blog
The anatomy of Snake ransomware
View our infographic


Snake ransomware is a relatively new ransomware strain that targets industrial control systems. Learn how it works, and explore effective defensive techniques.

Combating the new Snake ransomware: Detection and mitigation strategies

Watch webcast now

A day
in the life of a
SOC analyst

A security and operations center (SOC) analyst is a cybersecurity professional who ensures that their organization's data remains safe and secure. Find out what this function entails, and how you can succeed at this job.

A day in the life of a SOC analyst

A security operations center (SOC) analyst is an integral part of a SOC team, which is responsible for keeping an enterprise safe from cybercrime.

Read this blog


Best Practices

What best practices and strategies should cybersecurity professionals follow to stop attackers?
Let's take a futuristic approach to answering this question.

7 cybersecurity best practices every organization should implement

Read Our Blog

Become cyberaware: How to defend against sophisticated attackers

Register for our webinar

Featured this week

Blogs and Articles

Advancing the financial sector's cybersecurity with AI
Learn more

Blogs and Articles

How to conduct an effective risk assessment for your healthcare organization:
Learn more

Blogs and Articles

The evolution of cyberattacks
Learn more

Take this cybersecurity quiz for your chance to win

How well do you know IT security concepts?

Authors Jon Erickson and Kevin D. Mitnick share their insights in what are arguably two of the best cybersecurity books ever written. Participants with the best scores will have a chance to win a copy of one of these books. Winners and prizes are selected at random.

Start Quiz