Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 1 to 10
Identity Governance And Administration (IGA) In IT Infrastructure Of Today
15th Jun 2018 [5 days ago] from InfoSec
Identity Governance and Administration (IGA) can be considered a very important area in the management of information technology in enterprises and organizations. The level of IGA importance can be...Go on to the site to read the full...
The EU Plans To Adopt A Cybersecurity Certification Framework
15th Jun 2018 [5 days ago] from InfoSec
1. Introduction At present, there is no EU-wide certification framework that allows suppliers of ICT products to obtain information security certificates valid in all 28 EU countries. For example, if...Go on to the site to read the full...
And Again, About Storing Passwords
15th Jun 2018 [5 days ago] from InfoSec
When the question of storing passwords arise, the first idea is to simply keep them in clear text in the corresponding table in the database. However, in 2018 cybercriminals are very good at getting...Go on to the site to read the full...
The Top 15 Must-Have Books In InfoSec
15th Jun 2018 [5 days ago] from InfoSec
An essential part in building an information security (InfoSec) professionals expertise is played by hands-on experience and years of activity. However, a solid theoretical foundation is also...Go on to the site to read the full...
Personally Identifiable Information And Distributed Ledgers
15th Jun 2018 [5 days ago] from InfoSec
PII (personally identifiable information) is a valuable component of every individuals life. Governments and organizations take significant efforts to protect this data on the local and...Go on to the site to read the full article
Federal Agencies Are At High Information Security Risk
15th Jun 2018 [5 days ago] from InfoSec
1. Introduction Governments all over the world urge private companies to take security measures to protect the personal data of their citizens. For example, the recently adopted EU General Data...Go on to the site to read the full...
How A National Healthcare Provider Mitigates Spearphishing With SecurityIQ’s PhishNotify
15th Jun 2018 [6 days ago] from InfoSec
Executive Summary: Client: Managed healthcare service provider with clients in over 30 states. It employees over 3,000 corporate employees and 600 physicians. Contract Size: 900 learner seats...Go on to the site to read the full...
SecurityIQ Update Adds CDN Capabilities, Training Link Generator And 47 New Modules!
15th Jun 2018 [6 days ago] from InfoSec
New SecurityIQ features include a dedicated CDN to support international teams, training link generator ensuring all of your learners have access to your awareness program, plus easily customize your...Go on to the site to read the full...
Top Threats To Online Voting From A Cybersecurity Perspective
15th Jun 2018 [6 days ago] from InfoSec
Last year, NASA set up an online voting campaign to pick a name for an astronomical object, a small ice-covered asteroid roving through a remote part of the Solar system. Although the New Horizons...Go on to the site to read the full...
CISSP CAT Exam Deep Dive: Study Tips From InfoSec Institute Alum Joe Wauson
15th Jun 2018 [6 days ago] from InfoSec
Joe Wauson is a Cyber Operations Planner at the United States Air Force. Currently based out of Germany, Joe enrolled in InfoSec Institute’s live online Certified Information Systems Security...Go on to the site to read the full...
1 2 3 4 5 6 7 8 9 10 Older »