General security

General security
Introduction Early 2016, the Director of National Intelligence James Clapper told Congress that the US intelligence agencies were aware of cyber-attacks agai

August 11, 2016
Pierluigi Paganini
General security
In the early stage when the first mobile phone was introduced, it was owned, managed and secured to business standards. Now mobile devices have grown in bill

August 10, 2016
Irfan Shakeel
General security
Introduction In February of this year, Director of National Intelligence James Clapper told Congress that intelligence officials were already seeing targetin

August 02, 2016
Pierluigi Paganini
General security
Introduction The gaming industry is one of the most lucrative markets, for this reason, is becoming even more attractive to cybercriminals. Hackers are emplo

July 26, 2016
Pierluigi Paganini
General security
Everyone wants to maintain privacy while surfing the internet and most of them rely on TOR network to achieve anonymity while online. As we all know TOR has

July 19, 2016
Security Ninja
General security
What is the Brexit? The term is short for "British exit" and refers to the exit from the EU of the UK Government following the referendum result of June 23,

July 07, 2016
Pierluigi Paganini
General security
It is not surprising to consider the fact that whenever a person holds some valuable information, there are always some criminals looking to steal that infor

June 28, 2016
Irfan Shakeel
General security
Introduction Ransomware is considered by the security industry one of the most dangerous threats to Internet users and organizations across the world. Malwar

June 08, 2016
Pierluigi Paganini
General security
Crypto ransomware continues to be a scourge on the computer security arena. Not only do these infections grab and hold end users' files hostage, but they hav

June 07, 2016
David Balaban
General security
Nowadays, people can do anything online, even vote in elections. In fact, some form of remote electronic voting (e-voting) is taking place at this moment thr

May 19, 2016
Daniel BrechtIn this series
- Digital points of failure: A shared need for cyber resilience
- Diving deep into data analytics and its importance in cybersecurity
- Free Valentine's Day cybersecurity cards: Keep your love secure!
- How to design effective cybersecurity policies
- What is attack surface management and how it makes the enterprise more secure
- Is a cybersecurity boot camp worth it?
- The aftermath: An analysis of recent security breaches
- Understanding cybersecurity breaches: Types, common causes and potential risks
- Breaking the Silo: Integrating Email Security with XDR
- What is Security Service Edge (SSE)?
- Cybersecurity in Biden’s era
- Password security: Using Active Directory password policy
- Inside a DDoS attack against a bank: What happened and how it was stopped
- Inside Capital One’s game-changing breach: What happened and key lessons
- A DevSecOps process for ransomware prevention
- What is Digital Risk Protection (DRP)?
- How to choose and harden your VPN: Best practices from NSA & CISA
- Will immersive technology evolve or solve cybercrime?
- Twitch and YouTube abuse: How to stop online harassment
- Can your personality indicate how you’ll react to a cyberthreat?
- The 5 biggest cryptocurrency heists of all time
- Pay GDPR? No thanks, we’d rather pay cybercriminals
- Customer data protection: A comprehensive cybersecurity guide for companies
- Online certification opportunities: 4 vendors who offer online certification exams [updated 2021]
- FLoC delayed: what does this mean for security and privacy?
- Stolen company credentials used within hours, study says
- Don’t use CAPTCHA? Here are 9 CAPTCHA alternatives
- 10 ways to build a cybersecurity team that sticks
- Verizon DBIR 2021 summary: 7 things you should know
- 2021 cybersecurity executive order: Everything you need to know
- Kali Linux: Top 5 tools for stress testing
- Android security: 7 tips and tricks to secure you and your workforce [updated 2021]
- Mobile emulator farms: What are they and how they work
- 3 tracking technologies and their impact on privacy
- In-game currency & money laundering schemes: Fortnite, World of Warcraft & more
- Quantitative risk analysis [updated 2021]
- Understanding DNS sinkholes - A weapon against malware [updated 2021]
- Python for network penetration testing: An overview
- Python for exploit development: Common vulnerabilities and exploits
- Python for exploit development: All about buffer overflows
- Python language basics: understanding exception handling
- Python for pentesting: Programming, exploits and attacks
- Increasing security by hardening the CI/CD build infrastructure
- Pros and cons of public vs internal container image repositories
- CI/CD container security considerations
- Vulnerability scanning inside and outside the container
- How Docker primitives secure container environments
- Top 4 Zapier security risks
- Common container misconfigurations and how to prevent them
- Building container images using Dockerfile best practices
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!