General security

General security
StingRay and the cellphone surveillance In a previous post, I detailed the technologies used to track mobile devices, with a specific reference to the StingR

January 08, 2016
Pierluigi Paganini
General security
Introduction Here we are, once again, to discuss the current cyber threat landscape, trying to predict possible evolutions of the menaces for the next year.

December 31, 2015
Pierluigi Paganini
General security
Gift cards are a very pleasant gift, especially during the holiday season, but they also can represent a good opportunity for crooks. When dealing with gift

December 24, 2015
Pierluigi Paganini
General security
1. Introduction Wi-Fi (Wireless Network LAN) is a widespread wireless networking technology that is used in various public places (e.g., coffee shops, librar

December 11, 2015
Daniel Dimov
General security
I decided to start a new series of articles, "SAP Security for beginners". Everyone who is already into security, but wants to know more about SAP Security i

December 02, 2015
Alexander Polyakov
General security
Database security is one of the most important topics that have been discussed among security personnel. The growing number of incidents proves that it's som

November 13, 2015
Steve Lynch
General security
Section 1. Introduction Almost all devices we own and online accounts we create deploy an authorization system, a crucial element of personal data security.

October 30, 2015
Daniel Dimov
General security
Digital telecommunications represent a real danger today for governments, as their systems are being probed for weaknesses daily by a number of potential int

October 29, 2015
Daniel Brecht
General security
Web scraping is a widely used technique that transforms unstructured data on the web (HTML) into structured data which can be stored in a database or a sprea

October 20, 2015
Ivan Dimov
General security
Section 1. Introduction As a result of the rapidly developing robotics industry, more and more families worldwide integrate robots in their households. Robot

October 16, 2015
Daniel Dimov- 12 pre-built training plans
- Employer-requested skills
- Personalized, hands-on training
In this series
- Digital points of failure: A shared need for cyber resilience
- Diving deep into data analytics and its importance in cybersecurity
- Free Valentine's Day cybersecurity cards: Keep your love secure!
- How to design effective cybersecurity policies
- What is attack surface management and how it makes the enterprise more secure
- Is a cybersecurity boot camp worth it?
- The aftermath: An analysis of recent security breaches
- Understanding cybersecurity breaches: Types, common causes and potential risks
- Breaking the Silo: Integrating Email Security with XDR
- What is Security Service Edge (SSE)?
- Cybersecurity in Biden’s era
- Password security: Using Active Directory password policy
- Inside a DDoS attack against a bank: What happened and how it was stopped
- Inside Capital One’s game-changing breach: What happened and key lessons
- A DevSecOps process for ransomware prevention
- What is Digital Risk Protection (DRP)?
- How to choose and harden your VPN: Best practices from NSA & CISA
- Will immersive technology evolve or solve cybercrime?
- Twitch and YouTube abuse: How to stop online harassment
- Can your personality indicate how you’ll react to a cyberthreat?
- The 5 biggest cryptocurrency heists of all time
- Pay GDPR? No thanks, we’d rather pay cybercriminals
- Customer data protection: A comprehensive cybersecurity guide for companies
- Online certification opportunities: 4 vendors who offer online certification exams [updated 2021]
- FLoC delayed: what does this mean for security and privacy?
- Stolen company credentials used within hours, study says
- Don’t use CAPTCHA? Here are 9 CAPTCHA alternatives
- 10 ways to build a cybersecurity team that sticks
- Verizon DBIR 2021 summary: 7 things you should know
- 2021 cybersecurity executive order: Everything you need to know
- Kali Linux: Top 5 tools for stress testing
- Android security: 7 tips and tricks to secure you and your workforce [updated 2021]
- Mobile emulator farms: What are they and how they work
- 3 tracking technologies and their impact on privacy
- In-game currency & money laundering schemes: Fortnite, World of Warcraft & more
- Quantitative risk analysis [updated 2021]
- Understanding DNS sinkholes - A weapon against malware [updated 2021]
- Python for network penetration testing: An overview
- Python for exploit development: Common vulnerabilities and exploits
- Python for exploit development: All about buffer overflows
- Python language basics: understanding exception handling
- Python for pentesting: Programming, exploits and attacks
- Increasing security by hardening the CI/CD build infrastructure
- Pros and cons of public vs internal container image repositories
- CI/CD container security considerations
- Vulnerability scanning inside and outside the container
- How Docker primitives secure container environments
- Top 4 Zapier security risks
- Common container misconfigurations and how to prevent them
- Building container images using Dockerfile best practices
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!