SANS Rockville 2026

Author(s):

Feb 2 – 7, 2026 | In Person & Virtual (EST) Hilton Washington DC/Rockville Hotel & Executive Meeting Ctr & Virtual 1750 Rockville Pike Rockville, Maryland Unlock Your Cybersecurity Potential in Rockville Join an energizing and focused event that blends deep technical learning with meaningful connections. Whether you’re new to cybersecurity or leveling up your … Read more

NHI CON

Author(s):

January 27, 2026 | 9:00 AM – 1:50 PM (PST) Agentic AI is moving fast – and most organizations are still trying to make sense of it. Let’s bring together the builders and defenders asking the right questions, compare notes, and push the conversation forward. Limited participants. Reserve your spot early! As autonomy becomes embedded … Read more

SANS Cyber Threat Intelligence Summit & Training 2026

Author(s):

January 26-February 2, 2026 | Virtual & In Person (EST) Hilton Arlington Rosslyn The Key & Virtual (EST) 1900 Fort Myer Drive Arlington, Virginia Join us for our 14th Annual SANS Cyber Threat Intelligence Summit—an event devoted solely to the tradecraft of cyber threat analysis and intelligence! Gain fresh perspectives and insights from leading practitioners … Read more

5th NIST Quantum Matters in Material Sciences (QMMS) Workshop

Author(s):

February 18-19, 2026 | 5:00 PM (EST) NIST 100 Bureau Drive Gaithersburg, Maryland The 5th Quantum Matters in Materials Science (QMMS) workshop organized by the National Institute of Standards and Technology (NIST) will be held as an in-person only event at the NIST Gaithersburg campus, Maryland on February 18-19, 2026. The workshop will be focused … Read more

SANS Nashville Winter 2026

Author(s):

January 12-17, 2025 | In Person & Virtual (CST) Nashville Marriott at Vanderbilt University & Virtual 2555 West End Avenue Nashville, Tennessee Innovative Courses, Industry-Leading Instructors Whether you’re refining your cybersecurity skill set or exploring cutting-edge solutions, you’ll find the right course here. Explore tracks on: Cybersecurity Tactics & Strategy Advanced Control Implementation Building a … Read more

Cybersecurity as a Pillar of National Security: A Fight for Our Future

Author(s):

Gurdeep Gill, Software Engineer Technical Leader, CISCO Systems

Cybersecurity as a Pillar of National Security: A Fight for Our Future

Cybersecurity is undergoing an unprecedented transformation. AI’s growing adaptability now enables autonomous, evasive attacks. Simultaneously, quantum computers draw ever closer, capable of shattering our strongest encryption. These dual forces fundamentally reshape national security. Our nations now live and breathe through vast, interconnected networks, making every critical function inherently digital. This profound reality elevates cybersecurity to … Read more

Cyber Whistleblowing: What Employers Should Know

Author(s):

Frankie Wallace, ,

Cyber Whistleblowing

As businesses adopt emerging technologies like AI and VR, professional lives are growing more connected to the internet and, therefore, the world. While this can drastically improve efficiency and contribute to business growth, it has also led to a rise in cyber-attacks — and not just for tech companies. Cybercrime is affecting industries beyond tech, … Read more

Best Identity and Access Management (IAM) Practices for DevSecOps

Author(s):

Shigraf Aijaz, Cybersecurity Writer and Journalist,

Best IAM Practices

Humans have long been the weakest link in an organization’s cybersecurity infrastructure. Statistics reveal that human errors such as misconfigurations, secret leakage, and bad data hygiene cause 95% of data breaches. Hackers rarely find their way into a system through brute force attacks; in fact, the most commonly known strategy is phishing attacks that help … Read more

5 Common Cybersecurity/IT Mistakes in Your Small Business

Author(s):

Gloria Martinez, President, WomenLed

5-common-mistakes-martinez-

The world is filled with hackers and other criminals who hunt the web for unprotected small and medium-sized businesses.  Cybercriminals understand that many businesses are not equipped to manage a breach, leaving them more vulnerable to attacks and less likely to respond. But that doesn’t mean your company has to remain passive in the fight … Read more

The State of Server-Side Request Forgery Risks in 2022

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

server-side request forgery

Perhaps one of the best Black Hat talks in recent years was renowned web security researcher Orange Tsai’s presentation about bypassing Server-Side Request Forgery (SSRF) defenses. Together with his team, Tsai proposed a “very general attack approach” to discover numerous zero-days in built-in libraries of widely-used programming languages including Java, PHP, Python, Perl, JavaScript and … Read more