Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 21 to 30
Do You Need CIPT Certification?
26th Feb 2019 [24 days ago] from InfoSec
With data breaches a common topic of headlines and the number of cyberattacks on the rise, data privacy and protection has been on the minds of many organizations. Consider this: Cybersecurity...Go on to the site to read the full...
How To Align Training With The NIST NICE Framework
26th Feb 2019 [24 days ago] from InfoSec
The talent gap in the cybersecurity workforce has been widening every year. In 2018, (ISC)2 estimated the shortage at 2.93 million cybersecurity professionals globally, with more than 60 percent of...Go on to the site to read the full...
The Business Impact Of Cyber Risk — CyberSpeak Podcast
26th Feb 2019 [24 days ago] from InfoSec
We look into the business impact of cyber risk with an expert panel, including David Kruse, technology risk consultant, Justin Webb, CIPP-certified attorney and Jeff McCollum, crisis response and public relations professional. KPMG reports...
Tips To Help You Move Beyond A Help Desk Role
25th Feb 2019 [25 days ago] from InfoSec
Climbing the professional ladder is not an easy task, and this can seem especially scary when you are a newcomer at an entry-level position. In truth, taking into consideration today’s global market,...Go on to the site to read the full...
FourAndSix 2.1: CTF Walkthrough
25th Feb 2019 [25 days ago] from InfoSec
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on VulnHub by the author Fred. As you may be aware from my previous articles, VulnHub is a platform that provides...Go on to the site to read the full...
What Happens On The Endpoint Stays On The Endpoint
25th Feb 2019 [25 days ago] from InfoSec
When attacks bypass endpoint security, it can often take months for enterprises to discover them. Some security reports even estimate that it requires U.S. companies an average of 191 days to detect...Go on to the site to read the full...
The Current State Of Artificial Intelligence In Cybersecurity — CyberSpeak Podcast
22nd Feb 2019 [28 days ago] from InfoSec
Eric Stevens, vice president of engineering and principal architect at ProtectWise, discusses the current state of artificial intelligence in cybersecurity and the companys recent report on the topic, "The State of AI in Cybersecurity."...
Bob 1.0.1: CTF Walkthrough
21st Feb 2019 [29 days ago] from InfoSec
In this article, we will learn to solve a Capture the Flag (CTF) challenge which was posted on VulnHub by “c0rruptedb1t.” According to the information given by the author of the challenge, this CTF...Go on to the site to read the full...
Top 30 Information Assurance Analyst Interview Questions And Answers For 2019
21st Feb 2019 [29 days ago] from InfoSec
Introduction The Information Assurance Analyst position is an exciting information security position that comes with many responsibilities. Chief among these responsibilities are planning, designing...Go on to the site to read the full...
The Not-So-Black-and-White Of Grayware
20th Feb 2019 [one month ago] from InfoSec
We hear a lot about malware, and fair enough — malware is behind some of the world’s largest data breaches. However, malware has a cousin. This cousin is known as grayware. Grayware, as the name...Go on to the site to read the full...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »