Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 1 to 10
Beware Of The Drone! Privacy And Security Issues With Drones
23rd Apr 2019 [23 hours ago] from InfoSec
Drones, or “unmanned aerial vehicles,” (UAV) have flown into our lives both for the consumer hobbyist and as commercial and military devices. The market for drones used across all sectors is expected...Go on to the site to read the...
How To Become An Incident Responder
23rd Apr 2019 [23 hours ago] from InfoSec
Introduction Incident response is one of the most rapidly-growing careers in the IT industry. An incident responder is a highly-skilled cybersecurity expert who is responsible for responding to...Go on to the site to read the full...
Ch4inrulz 1.0.1: CTF Walkthrough, Part 1
22nd Apr 2019 [47 hours ago] from InfoSec
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on VulnHub by an author named Askar. The description given by the author is as follows: “Frank has a small website...Go on to the site to read the full...
How To Become An IT Auditor
22nd Apr 2019 [47 hours ago] from InfoSec
Becoming an IT auditor is a significant milestone, but it is not easy. It requires skill, determination and a lot of practice to get to the level where you can confidently certify your skills and...Go on to the site to read the full...
The OSCP Certification And Exam
22nd Apr 2019 [47 hours ago] from InfoSec
An introduction to the Offensive Security Certified Professional (OCSP) Certification For a career in information technology (IT) that encompasses defensive and offensive roles, you might want to...Go on to the site to read the full...
Risk Management And Understanding What Matters Most
18th Apr 2019 [5 days ago] from InfoSec
Liz Mann, head of the Life Sciences and Health sectors, Americas Cybersecurity, EY Advisory, discusses her role at EY, the importance of diverse perspectives around risk management, and her work encouraging young women to enter the cybersecurity...
Protecting The Secret Sauce: What You Need To Know About Intellectual Property (IP)
18th Apr 2019 [6 days ago] from InfoSec
Intellectual property (IP) rights may apply to a multitude of things, from corporate branding names and new inventions to product designs and secret recipes. Do you have a secret sauce whether a...Go on to the site to read the full...
Fowsniff 1: CTF Walkthrough
18th Apr 2019 [6 days ago] from InfoSec
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on VulnHub by berzerk0. As per the description given by the author, this is a beginner-level CTF but requires more...Go on to the site to read the full...
Lock It Down: Password Security Do’s And Don’ts
17th Apr 2019 [7 days ago] from InfoSec
Introduction to Passwords The first computer password was introduced for use at MIT in 1961. Of course, this isn’t human beings’ first dalliance with the idea of a password, but this isn’t a history...Go on to the site to read the...
Key Education For Information Security Careers: A Computer Science Degree?
17th Apr 2019 [7 days ago] from InfoSec
The importance of closing the cybersecurity skills gap Closing the information security and cybersecurity gap is becoming a priority. The cybersecurity skills shortage is projected to lead to 3.5...Go on to the site to read the full...
1 2 3 4 5 6 7 8 9 10 Older »