General security

General security
Introduction Social media has assumed a fundamental role in today's society. It is a technology with the highest penetration level, as billions of people are

January 31, 2013
Pierluigi Paganini
General security
Information security and penetration testing is not limited to find the vulnerabilities on the website and network; it is an interesting profession that cove

January 31, 2013
Irfan Shakeel
General security
Cyber attacks through the perspective of the armed attack notion A cyber attack cannot rise to the level of an armed attack as prescribed in Article 51 "bec

January 28, 2013
Dimitar Kostadinov
General security
Introduction Among the series of problems with regard to the legal regulation of cyber attacks is how the self-defense doctrine applies to them. In itself, t

January 25, 2013
Dimitar Kostadinov
General security
Employees using social networks such as Facebook and Google+ may not only waste a lot of their working time, but also spread viruses on their work computers.

January 25, 2013
Daniel Dimov
General security
Large corporations have been employing two-factor authentication and multi-factor authentication for years to protect against customer identity theft, fraud,

January 22, 2013
Robert Coulter
General security
This article is focused on the sport football (or soccer in the USA). Nevertheless, the same technology and security measures can be applied in virtually any

January 16, 2013
Dimitar Kostadinov
General security
Introduction Identity theft occurs when a person uses the identity of another person with the intent to obtain benefits illegally. The victim of the identity

January 14, 2013
Daniel Dimov
General security
The primary reason for writing this is to educate journalists and investigators who want to fight crime anonymously. However, the contents of this article ca

January 14, 2013
Aparajit i
General security
Email is still, to this day, the most used method of online communication. Even though many people predicted email would eventually get replaced by instant m

January 11, 2013
Patrick LambertIn this series
- Digital points of failure: A shared need for cyber resilience
- Diving deep into data analytics and its importance in cybersecurity
- Free Valentine's Day cybersecurity cards: Keep your love secure!
- How to design effective cybersecurity policies
- What is attack surface management and how it makes the enterprise more secure
- Is a cybersecurity boot camp worth it?
- The aftermath: An analysis of recent security breaches
- Understanding cybersecurity breaches: Types, common causes and potential risks
- Breaking the Silo: Integrating Email Security with XDR
- What is Security Service Edge (SSE)?
- Cybersecurity in Biden’s era
- Password security: Using Active Directory password policy
- Inside a DDoS attack against a bank: What happened and how it was stopped
- Inside Capital One’s game-changing breach: What happened and key lessons
- A DevSecOps process for ransomware prevention
- What is Digital Risk Protection (DRP)?
- How to choose and harden your VPN: Best practices from NSA & CISA
- Will immersive technology evolve or solve cybercrime?
- Twitch and YouTube abuse: How to stop online harassment
- Can your personality indicate how you’ll react to a cyberthreat?
- The 5 biggest cryptocurrency heists of all time
- Pay GDPR? No thanks, we’d rather pay cybercriminals
- Customer data protection: A comprehensive cybersecurity guide for companies
- Online certification opportunities: 4 vendors who offer online certification exams [updated 2021]
- FLoC delayed: what does this mean for security and privacy?
- Stolen company credentials used within hours, study says
- Don’t use CAPTCHA? Here are 9 CAPTCHA alternatives
- 10 ways to build a cybersecurity team that sticks
- Verizon DBIR 2021 summary: 7 things you should know
- 2021 cybersecurity executive order: Everything you need to know
- Kali Linux: Top 5 tools for stress testing
- Android security: 7 tips and tricks to secure you and your workforce [updated 2021]
- Mobile emulator farms: What are they and how they work
- 3 tracking technologies and their impact on privacy
- In-game currency & money laundering schemes: Fortnite, World of Warcraft & more
- Quantitative risk analysis [updated 2021]
- Understanding DNS sinkholes - A weapon against malware [updated 2021]
- Python for network penetration testing: An overview
- Python for exploit development: Common vulnerabilities and exploits
- Python for exploit development: All about buffer overflows
- Python language basics: understanding exception handling
- Python for pentesting: Programming, exploits and attacks
- Increasing security by hardening the CI/CD build infrastructure
- Pros and cons of public vs internal container image repositories
- CI/CD container security considerations
- Vulnerability scanning inside and outside the container
- How Docker primitives secure container environments
- Top 4 Zapier security risks
- Common container misconfigurations and how to prevent them
- Building container images using Dockerfile best practices
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!