General security

General security
In this article, we will discuss the 6 D's of cyber security and how you can implement them in your own cyber-defense strategy -- Deter, Detect, Defend, Defl

May 19, 2015
Joey Cusimano
General security
Keygenning is a process of finding a valid key for a program. It is used for cracking/piracy. Most of the cracking has been documented on x86, there haven't

May 18, 2015
SecRat
General security
In previous articles, we got to know the basics of the Stack Based Buffer Overflow and changing the address in the run time by modifying the register value u

April 30, 2015
Nikhil Kumar
General security
The drastic increase in the frequency of cyber attacks on financial systems and the healthcare industry (both large and small scale industries) have raised c

April 30, 2015
Ashiq JA
General security
Today a web browser has become a very important piece of software in our daily life. It is an application that finds and displays the web pages. Be it via mo

April 28, 2015
Satyam Singh
General security
Defense in depth is dead. The way you're thinking about data center security is outdated. Security started changing long before Sony, Target and the others g

April 21, 2015
Patrick Kerpan
General security
Today we officially kick off our long-awaited IT Thought Leader Interview series. First up in the hot seat is Morey Haber, Platform Product Manager and VP of

April 17, 2015
Infosec
General security
Introduction When it comes to anonymizing activities in digital world, it can be referred to in various ways. Researchers might take it to identify various m

April 13, 2015
Security Ninja
General security
Current scenario The number of cyber attacks is constantly increasing, and according to security experts they grow even more sophisticated. The security firm

March 31, 2015
Pierluigi Paganini
General security
"Old formats of documents that we've created or presentations may not be readable by the latest version of the software because backwards compatibility is n

March 23, 2015
Ashiq JAIn this series
- Digital points of failure: A shared need for cyber resilience
- Diving deep into data analytics and its importance in cybersecurity
- Free Valentine's Day cybersecurity cards: Keep your love secure!
- How to design effective cybersecurity policies
- What is attack surface management and how it makes the enterprise more secure
- Is a cybersecurity boot camp worth it?
- The aftermath: An analysis of recent security breaches
- Understanding cybersecurity breaches: Types, common causes and potential risks
- Breaking the Silo: Integrating Email Security with XDR
- What is Security Service Edge (SSE)?
- Cybersecurity in Biden’s era
- Password security: Using Active Directory password policy
- Inside a DDoS attack against a bank: What happened and how it was stopped
- Inside Capital One’s game-changing breach: What happened and key lessons
- A DevSecOps process for ransomware prevention
- What is Digital Risk Protection (DRP)?
- How to choose and harden your VPN: Best practices from NSA & CISA
- Will immersive technology evolve or solve cybercrime?
- Twitch and YouTube abuse: How to stop online harassment
- Can your personality indicate how you’ll react to a cyberthreat?
- The 5 biggest cryptocurrency heists of all time
- Pay GDPR? No thanks, we’d rather pay cybercriminals
- Customer data protection: A comprehensive cybersecurity guide for companies
- Online certification opportunities: 4 vendors who offer online certification exams [updated 2021]
- FLoC delayed: what does this mean for security and privacy?
- Stolen company credentials used within hours, study says
- Don’t use CAPTCHA? Here are 9 CAPTCHA alternatives
- 10 ways to build a cybersecurity team that sticks
- Verizon DBIR 2021 summary: 7 things you should know
- 2021 cybersecurity executive order: Everything you need to know
- Kali Linux: Top 5 tools for stress testing
- Android security: 7 tips and tricks to secure you and your workforce [updated 2021]
- Mobile emulator farms: What are they and how they work
- 3 tracking technologies and their impact on privacy
- In-game currency & money laundering schemes: Fortnite, World of Warcraft & more
- Quantitative risk analysis [updated 2021]
- Understanding DNS sinkholes - A weapon against malware [updated 2021]
- Python for network penetration testing: An overview
- Python for exploit development: Common vulnerabilities and exploits
- Python for exploit development: All about buffer overflows
- Python language basics: understanding exception handling
- Python for pentesting: Programming, exploits and attacks
- Increasing security by hardening the CI/CD build infrastructure
- Pros and cons of public vs internal container image repositories
- CI/CD container security considerations
- Vulnerability scanning inside and outside the container
- How Docker primitives secure container environments
- Top 4 Zapier security risks
- Common container misconfigurations and how to prevent them
- Building container images using Dockerfile best practices
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!