General security

General security
Before starting, I would like to give a small preview about the topic. This article focuses on the world famous hacker group, known as "Anonymous." I will be

August 29, 2013
Warlock
General security
Introduction: [pkadzone zone="main_top"] Doxing is a coin with two sides. Doxing can be used for security, research and collecting proof for investigation i

August 29, 2013
Nutan Panda
General security
1. Introduction One-time passwords are used to achieve higher security than traditional static passwords. They're often generated by tokens. This article pre

August 21, 2013
Dawid Czagan
General security
I. Criticism and possible flaws of consequence-based approach and seven-factor test There are people from the field of law, and not only, who do not think t

August 09, 2013
Dimitar Kostadinov
General security
The consequence-based duo tests The focus of this contribution is placed on two tests which employ the consequence-based approach that, in turn, aims to cat

August 06, 2013
Dimitar Kostadinov
General security
Introductory presentation While still reviewing the instrument-based theory, there was a slight allusion at some point that oftentimes from practical reason

August 05, 2013
Dimitar Kostadinov
General security
The saga continues. Now things get really interesting. In our last episode our identity thief had successfully procured a check made out to the dealership fo

July 29, 2013
Richard Sands
General security
As in any other field, for a win, we should take a look at the successful stories and case studies around us. In this article I would like to talk about opti

July 26, 2013
Adrian Birsan
General security
Who is Edward Snowden? Edward Snowden is the man who changed the history of the Internet; he revealed information on the largest and most secret surveillance

July 25, 2013
Pierluigi Paganini
General security
Why Audit? Harriet Beecher Stowe is credited with the quote "Human nature is above all things lazy" - while I prefer to think of myself as 'efficient' rathe

July 24, 2013
Alex Horan- 12 pre-built training plans
- Employer-requested skills
- Personalized, hands-on training
In this series
- Digital points of failure: A shared need for cyber resilience
- Diving deep into data analytics and its importance in cybersecurity
- Free Valentine's Day cybersecurity cards: Keep your love secure!
- How to design effective cybersecurity policies
- What is attack surface management and how it makes the enterprise more secure
- Is a cybersecurity boot camp worth it?
- The aftermath: An analysis of recent security breaches
- Understanding cybersecurity breaches: Types, common causes and potential risks
- Breaking the Silo: Integrating Email Security with XDR
- What is Security Service Edge (SSE)?
- Cybersecurity in Biden’s era
- Password security: Using Active Directory password policy
- Inside a DDoS attack against a bank: What happened and how it was stopped
- Inside Capital One’s game-changing breach: What happened and key lessons
- A DevSecOps process for ransomware prevention
- What is Digital Risk Protection (DRP)?
- How to choose and harden your VPN: Best practices from NSA & CISA
- Will immersive technology evolve or solve cybercrime?
- Twitch and YouTube abuse: How to stop online harassment
- Can your personality indicate how you’ll react to a cyberthreat?
- The 5 biggest cryptocurrency heists of all time
- Pay GDPR? No thanks, we’d rather pay cybercriminals
- Customer data protection: A comprehensive cybersecurity guide for companies
- Online certification opportunities: 4 vendors who offer online certification exams [updated 2021]
- FLoC delayed: what does this mean for security and privacy?
- Stolen company credentials used within hours, study says
- Don’t use CAPTCHA? Here are 9 CAPTCHA alternatives
- 10 ways to build a cybersecurity team that sticks
- Verizon DBIR 2021 summary: 7 things you should know
- 2021 cybersecurity executive order: Everything you need to know
- Kali Linux: Top 5 tools for stress testing
- Android security: 7 tips and tricks to secure you and your workforce [updated 2021]
- Mobile emulator farms: What are they and how they work
- 3 tracking technologies and their impact on privacy
- In-game currency & money laundering schemes: Fortnite, World of Warcraft & more
- Quantitative risk analysis [updated 2021]
- Understanding DNS sinkholes - A weapon against malware [updated 2021]
- Python for network penetration testing: An overview
- Python for exploit development: Common vulnerabilities and exploits
- Python for exploit development: All about buffer overflows
- Python language basics: understanding exception handling
- Python for pentesting: Programming, exploits and attacks
- Increasing security by hardening the CI/CD build infrastructure
- Pros and cons of public vs internal container image repositories
- CI/CD container security considerations
- Vulnerability scanning inside and outside the container
- How Docker primitives secure container environments
- Top 4 Zapier security risks
- Common container misconfigurations and how to prevent them
- Building container images using Dockerfile best practices
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!