General security

General security
Introduction The number of cyber-attacks continues to increase such as the offensives conducted by nation-state hackers against governments worldwide. Often,

October 03, 2016
Pierluigi Paganini
General security
Overview of the Last Article Our last article reviewed the Biometric KPIs and standards which have been set forth and established by both industry and govern

September 27, 2016
Ravi Das
General security
Overview of the Last Article In all of the articles we have covered thus far, we have covered a wide range of Biometric technologies. These have ranged from

September 21, 2016
Ravi Das
General security
Overview of the Last Article Our last article reviewed at length the latest Biometric modality to come, which is Vein Pattern Recognition, also known as VPR.

September 16, 2016
Ravi Das
General security
As it was reviewed in the last article, Hand Geometry Recognition is the oldest Biometric Technology of all. It has its originations going back to the 1960s,

September 09, 2016
Ravi Das
General security
Overview of the Last Article Our last article dealt with what is deemed to be the Ultimate Biometric Modality of all-Retinal Recognition. By itself, the eye

August 29, 2016
Ravi Das
General security
Introduction Overview of the Last Article Our last article continued into the review and examination of Biometrics. This type of security tool, while it has

August 23, 2016
Ravi Das
General security
Just a few years back, drones or Unmanned Aerial Vehicle (UAV) were unknown to the world. These days, drones are idealized up with the thoughts of bombing an

August 23, 2016
Irfan Shakeel
General security
Review of the last article As we have seen, there are numerous applications for Biometric Technology. They can range from very simple applications, such as

August 22, 2016
Ravi Das
General security
Introduction Overview of the Previous Article Our last article reviewed what Multimodal Biometric Solutions are all about, and what the implications are for

August 15, 2016
Ravi DasIn this series
- Digital points of failure: A shared need for cyber resilience
- Diving deep into data analytics and its importance in cybersecurity
- Free Valentine's Day cybersecurity cards: Keep your love secure!
- How to design effective cybersecurity policies
- What is attack surface management and how it makes the enterprise more secure
- Is a cybersecurity boot camp worth it?
- The aftermath: An analysis of recent security breaches
- Understanding cybersecurity breaches: Types, common causes and potential risks
- Breaking the Silo: Integrating Email Security with XDR
- What is Security Service Edge (SSE)?
- Cybersecurity in Biden’s era
- Password security: Using Active Directory password policy
- Inside a DDoS attack against a bank: What happened and how it was stopped
- Inside Capital One’s game-changing breach: What happened and key lessons
- A DevSecOps process for ransomware prevention
- What is Digital Risk Protection (DRP)?
- How to choose and harden your VPN: Best practices from NSA & CISA
- Will immersive technology evolve or solve cybercrime?
- Twitch and YouTube abuse: How to stop online harassment
- Can your personality indicate how you’ll react to a cyberthreat?
- The 5 biggest cryptocurrency heists of all time
- Pay GDPR? No thanks, we’d rather pay cybercriminals
- Customer data protection: A comprehensive cybersecurity guide for companies
- Online certification opportunities: 4 vendors who offer online certification exams [updated 2021]
- FLoC delayed: what does this mean for security and privacy?
- Stolen company credentials used within hours, study says
- Don’t use CAPTCHA? Here are 9 CAPTCHA alternatives
- 10 ways to build a cybersecurity team that sticks
- Verizon DBIR 2021 summary: 7 things you should know
- 2021 cybersecurity executive order: Everything you need to know
- Kali Linux: Top 5 tools for stress testing
- Android security: 7 tips and tricks to secure you and your workforce [updated 2021]
- Mobile emulator farms: What are they and how they work
- 3 tracking technologies and their impact on privacy
- In-game currency & money laundering schemes: Fortnite, World of Warcraft & more
- Quantitative risk analysis [updated 2021]
- Understanding DNS sinkholes - A weapon against malware [updated 2021]
- Python for network penetration testing: An overview
- Python for exploit development: Common vulnerabilities and exploits
- Python for exploit development: All about buffer overflows
- Python language basics: understanding exception handling
- Python for pentesting: Programming, exploits and attacks
- Increasing security by hardening the CI/CD build infrastructure
- Pros and cons of public vs internal container image repositories
- CI/CD container security considerations
- Vulnerability scanning inside and outside the container
- How Docker primitives secure container environments
- Top 4 Zapier security risks
- Common container misconfigurations and how to prevent them
- Building container images using Dockerfile best practices
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!