Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 51 to 60
What Are Honeywords? Password Protection For Database Breaches
21st Sep 2018 [5 days ago] from InfoSec
Introduction Despite all the recent advancements in information security technology, the basic problem of hacking into a server or database has not been solved. Hackers and attackers can still, with...Go on to the site to read the full...
PMP®️ Domain Information & Overview
21st Sep 2018 [5 days ago] from InfoSec
The Project Management Professional (PMP) is a registered mark of the Project Management Institute, Inc. Hello, and welcome back to this series on the Project Management Professional (PMP)®️...Go on to the site to read the full...
What Is A Data Protection Officer?
21st Sep 2018 [5 days ago] from InfoSec
Introduction to the General Data Privacy Regulation The General Data Privacy Regulation (GDPR) governs how the personal data of EU citizens can be collected, transmitted, processed and stored inside...Go on to the site to read the full...
How A Data Protection Officer Will Benefit Your Organization
21st Sep 2018 [5 days ago] from InfoSec
In May of 2018, the European Union’s General Data Protection Regulation (GDPR) came into force. This wide-reaching law touches any company, no matter what size or type, as long as they process the...Go on to the site to read the full...
Building A Security Awareness Program On An Organizational Level
21st Sep 2018 [5 days ago] from InfoSec
Introduction: A Case Study Liz Raymond finally had some peace and quiet in her office. The day had been quite chaotic, but now that there were only a few minutes left before a relaxing weekend and...Go on to the site to read the full...
Spam Or Phish? How To Tell The Difference Between A Marketing Email And A Malicious Spam Email
21st Sep 2018 [5 days ago] from InfoSec
Virtual crime is a side effect of the convenience of technology. With greater strides in technology making everything from banking to communication faster and easier, cybercriminals are also finding...Go on to the site to read the full...
What Is Protected Health Information (PHI)?
21st Sep 2018 [5 days ago] from InfoSec
Healthcare is a data-rich industry. These data are created across the entire healthcare ecosystem; they represent a wealth of information that can be used to ultimately lead to better patient...Go on to the site to read the full...
[dos] WebRTC - FEC Out-of-Bounds Read
21st Sep 2018 [5 days ago] from Exploit-db
WebRTC - FEC Out-of-Bounds Read
[dos] WebRTC - VP9 Processing Use-After-Free
21st Sep 2018 [5 days ago] from Exploit-db
WebRTC - VP9 Processing Use-After-Free
[webapps] Collectric CMU 1.0 - Lang SQL Injection
21st Sep 2018 [5 days ago] from Exploit-db
Collectric CMU 1.0 - lang SQL injection
« Newer 1 2 3 4 5 6 7 8 9 10 Older »