Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 1 to 10
Top 6 Cybersecurity Books For IT Auditors
13th Aug 2020 [23 hours ago] from InfoSec
Introduction Like many other information security professionals, you probably have a library of books on the topic of your career choice. Not only that, but like many others, yours is probably not as...Go on to the site to read the full...
Podcast Recap: Email Attack Trend Predictions For 2020
13th Aug 2020 [24 hours ago] from InfoSec
Introduction Email continues to be a major method of communication in both personal and professional contexts. The sheer proliferation of information transmitted via email every day makes it an...Go on to the site to read the full...
Zeus Sphinx: What It Is, How It Works And How To Prevent It | Malware Spotlight
12th Aug 2020 [48 hours ago] from InfoSec
Introduction When something is described as “rising from the ashes,” the mythological creature known as the phoenix normally comes to mind. For those that research malware, they may soon want to swap...Go on to the site to read the...
National Counterintelligence And Security Center: 5 Priorities For 2020
12th Aug 2020 [48 hours ago] from InfoSec
Introduction: NCSC’s role For years, the United States has faced increasingly aggressive and complex threats from foreign intelligence entities (FIEs) and nation-states, as well as from a range of...Go on to the site to read the full...
How Privacy Agreements Impact Data Privacy For Business Users: Slack, Zoom And Microsoft Teams
11th Aug 2020 [3 days ago] from InfoSec
The growing interest in third-party collaboration apps The growing trend toward remote work is changing how people communicate in the workplace. Cloud-based collaboration apps and videoconferencing...Go on to the site to read the full...
How To Detect And Prevent Web Shells: New Guidance From The NSA And The Australian Government
11th Aug 2020 [3 days ago] from InfoSec
Introduction It’s not every day that governments of different countries draft guidance rules about any subject together. It is even rarer that they create joint guidance for cybersecurity reasons. It...Go on to the site to read the full...
What Are Black Box, Grey Box, And White Box Penetration Testing? [Updated 2020]
11th Aug 2020 [3 days ago] from InfoSec
Introduction Pentesters are apparently huge fans of colors. Different roles within pentesting assignments are designated as Red Team, Blue Team, Purple Team and others. Given this, it’s not...Go on to the site to read the full...
Hack The Box (HTB) Machines Walkthrough Series — ServMon
10th Aug 2020 [4 days ago] from InfoSec
Today, we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is of an HTB machine named ServMon. HTB is an excellent platform that...Go on to the site to read the full...
Top 8 World Crises Exploited By Cybercriminals And Lessons Learned
10th Aug 2020 [4 days ago] from InfoSec
Introduction Crises can vary immensely, be it in terms of the specific nature of each situation or the impacts that may be limited to a specific group — or even an event such as the COVID-19, which...Go on to the site to read the full...
Securing Cookies With HttpOnly And Secure Flags [Updated 2020]
10th Aug 2020 [4 days ago] from InfoSec
Learn how to fight malware Any program that runs can be disassembled, but that doesn’t mean it’s going to be easy. In this skills course youll learn ⇒ Anti-Debugging Techniques ⇒ Detecting...Go on to the site to read the full...
1 2 3 4 5 6 7 8 9 10 Older »