General security

General security
In previous articles on planning and estimating projects, we explored the basic principle of estimates. Estimating cannot really determine precisely what we

December 05, 2012
Adrian Stolarski
General security
Introduction On October 24th 2012, Diigo, a social bookmarking website allowing signed-up users to bookmark and tag web pages, had its domain, diigo.com

December 04, 2012
Daniel Dimov
General security
Agenda: 1. Prototyping – what is it? 2. The design process. 3. Showing the project to client before developers will write any line of code. 4. Changes in

November 28, 2012
Lucas Stolarski
General security
The Right to Anonymity Every operation made in cyber space, every visited web site, and every web service accessed, leave traces of the user's experience on

November 15, 2012
Pierluigi Paganini
General security
1. Introduction When analyzing malware we can gather a lot of information just by identifying the IP addresses and domains the malware software uses. Most m

November 13, 2012
Dejan Lukan
General security
Passwords are not secure and are useless as an access control… at least that is what many vendors and security consultants try to tell managers today. Instea

November 12, 2012
Tom Olzak
General security
Some people think onion routing or the Tor network is for criminals and people with something to hide. Well, they are half right. The Tor network was designe

November 02, 2012
Jeremy Martin
General security
1. Introduction In 2006, a laptop containing personal and health data of 26,500,000 veterans was stolen from a data analyst working for the US Department o

October 31, 2012
Daniel Dimov
General security
For part 1 of this series, please click here. In the first part, our discussion of the estimation focused primarily on the general principles of creating an

October 26, 2012
Adrian Stolarski
General security
Each of us who has ever worked in any programming project has had to deal with one of the biggest problems we face when creating projects. It is, of course,

October 25, 2012
Adrian Stolarski- 12 pre-built training plans
- Employer-requested skills
- Personalized, hands-on training
In this series
- Digital points of failure: A shared need for cyber resilience
- Diving deep into data analytics and its importance in cybersecurity
- Free Valentine's Day cybersecurity cards: Keep your love secure!
- How to design effective cybersecurity policies
- What is attack surface management and how it makes the enterprise more secure
- Is a cybersecurity boot camp worth it?
- The aftermath: An analysis of recent security breaches
- Understanding cybersecurity breaches: Types, common causes and potential risks
- Breaking the Silo: Integrating Email Security with XDR
- What is Security Service Edge (SSE)?
- Cybersecurity in Biden’s era
- Password security: Using Active Directory password policy
- Inside a DDoS attack against a bank: What happened and how it was stopped
- Inside Capital One’s game-changing breach: What happened and key lessons
- A DevSecOps process for ransomware prevention
- What is Digital Risk Protection (DRP)?
- How to choose and harden your VPN: Best practices from NSA & CISA
- Will immersive technology evolve or solve cybercrime?
- Twitch and YouTube abuse: How to stop online harassment
- Can your personality indicate how you’ll react to a cyberthreat?
- The 5 biggest cryptocurrency heists of all time
- Pay GDPR? No thanks, we’d rather pay cybercriminals
- Customer data protection: A comprehensive cybersecurity guide for companies
- Online certification opportunities: 4 vendors who offer online certification exams [updated 2021]
- FLoC delayed: what does this mean for security and privacy?
- Stolen company credentials used within hours, study says
- Don’t use CAPTCHA? Here are 9 CAPTCHA alternatives
- 10 ways to build a cybersecurity team that sticks
- Verizon DBIR 2021 summary: 7 things you should know
- 2021 cybersecurity executive order: Everything you need to know
- Kali Linux: Top 5 tools for stress testing
- Android security: 7 tips and tricks to secure you and your workforce [updated 2021]
- Mobile emulator farms: What are they and how they work
- 3 tracking technologies and their impact on privacy
- In-game currency & money laundering schemes: Fortnite, World of Warcraft & more
- Quantitative risk analysis [updated 2021]
- Understanding DNS sinkholes - A weapon against malware [updated 2021]
- Python for network penetration testing: An overview
- Python for exploit development: Common vulnerabilities and exploits
- Python for exploit development: All about buffer overflows
- Python language basics: understanding exception handling
- Python for pentesting: Programming, exploits and attacks
- Increasing security by hardening the CI/CD build infrastructure
- Pros and cons of public vs internal container image repositories
- CI/CD container security considerations
- Vulnerability scanning inside and outside the container
- How Docker primitives secure container environments
- Top 4 Zapier security risks
- Common container misconfigurations and how to prevent them
- Building container images using Dockerfile best practices
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!