General security

General security
This article will briefly discuss the host-based intrusion detection system (HIDS) and an abstract approach that can be used to design an application firewal

January 03, 2014
Amar Nath
General security
Bridged networking can be used when we want our guest virtual machine to get the IP address from our router and be able to see the host and all other machine

December 31, 2013
Dejan Lukan
General security
There are different kind of backend networks that we can use with QEMU. In order to specify the backend network, we need to use the -netdev command-line opti

December 30, 2013
Dejan Lukan
General security
Now that we've created the image for our guest, we must continue with installing the operating system on it. In Virtualbox/VMWare, we usually select the CD-R

December 27, 2013
Dejan Lukan
General security
As the year 2013 draws to a close, we decided to make some predictions for the most popular Security Trends in 2014. Here is what we think are the major poin

December 26, 2013
Prateek Gianchandani
General security
Introduction The year is closing and it's time for prediction of the evolution of the security landscape in 2014. It's easy to predict an increase in the vol

December 13, 2013
Pierluigi Paganini
General security
Introduction This article was inspired by two factors: 1) the petition filed by Anonymous on the White House's We the People website in the beginning of 2013

December 12, 2013
Dimitar Kostadinov
General security
Introduction: Initial Detection/Mitigation Challenges[pkadzone zone="main_top"] Before we go to the main topic of this article, let us take heed of two fact

December 04, 2013
Dimitar Kostadinov
General security
We live in a world where we're connected to each other by a mouse click and a few keystrokes. It's a revolution that changed the way we live our lives and ru

November 25, 2013
Bhavesh Naik
General security
It is hard to accept that nowadays, organizations get along without having an astute and decisive information system. Providing a reliable and coherence info

November 16, 2013
Infosec- 12 pre-built training plans
- Employer-requested skills
- Personalized, hands-on training
In this series
- Digital points of failure: A shared need for cyber resilience
- Diving deep into data analytics and its importance in cybersecurity
- Free Valentine's Day cybersecurity cards: Keep your love secure!
- How to design effective cybersecurity policies
- What is attack surface management and how it makes the enterprise more secure
- Is a cybersecurity boot camp worth it?
- The aftermath: An analysis of recent security breaches
- Understanding cybersecurity breaches: Types, common causes and potential risks
- Breaking the Silo: Integrating Email Security with XDR
- What is Security Service Edge (SSE)?
- Cybersecurity in Biden’s era
- Password security: Using Active Directory password policy
- Inside a DDoS attack against a bank: What happened and how it was stopped
- Inside Capital One’s game-changing breach: What happened and key lessons
- A DevSecOps process for ransomware prevention
- What is Digital Risk Protection (DRP)?
- How to choose and harden your VPN: Best practices from NSA & CISA
- Will immersive technology evolve or solve cybercrime?
- Twitch and YouTube abuse: How to stop online harassment
- Can your personality indicate how you’ll react to a cyberthreat?
- The 5 biggest cryptocurrency heists of all time
- Pay GDPR? No thanks, we’d rather pay cybercriminals
- Customer data protection: A comprehensive cybersecurity guide for companies
- Online certification opportunities: 4 vendors who offer online certification exams [updated 2021]
- FLoC delayed: what does this mean for security and privacy?
- Stolen company credentials used within hours, study says
- Don’t use CAPTCHA? Here are 9 CAPTCHA alternatives
- 10 ways to build a cybersecurity team that sticks
- Verizon DBIR 2021 summary: 7 things you should know
- 2021 cybersecurity executive order: Everything you need to know
- Kali Linux: Top 5 tools for stress testing
- Android security: 7 tips and tricks to secure you and your workforce [updated 2021]
- Mobile emulator farms: What are they and how they work
- 3 tracking technologies and their impact on privacy
- In-game currency & money laundering schemes: Fortnite, World of Warcraft & more
- Quantitative risk analysis [updated 2021]
- Understanding DNS sinkholes - A weapon against malware [updated 2021]
- Python for network penetration testing: An overview
- Python for exploit development: Common vulnerabilities and exploits
- Python for exploit development: All about buffer overflows
- Python language basics: understanding exception handling
- Python for pentesting: Programming, exploits and attacks
- Increasing security by hardening the CI/CD build infrastructure
- Pros and cons of public vs internal container image repositories
- CI/CD container security considerations
- Vulnerability scanning inside and outside the container
- How Docker primitives secure container environments
- Top 4 Zapier security risks
- Common container misconfigurations and how to prevent them
- Building container images using Dockerfile best practices
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!