Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 31 to 40
How To Pick The Best Cyber Range For Your Cybersecurity Training Needs And Budget
7th Oct 2020 [5 months ago] from InfoSec
Introduction Whether your organization is tired of being held back by the cybersecurity workforce skills gap or your management team has watched the worst that a cyberattack could do to a peer...Go on to the site to read the full...
Monitoring Business Communication Tools Like Slack For Data Infiltration Risks
7th Oct 2020 [5 months ago] from InfoSec
Introduction If you’re sending instant messages at work, chances are you’re using Slack, the business-oriented analog of WhatsApp or Discord. Slack currently boasts over 12 million users worldwide,...Go on to the site to read the full...
Inside The Lyceum/Hexane Malware
7th Oct 2020 [5 months ago] from InfoSec
The Lyceum/Hexane Cybercrime Group Lyceum and Hexane are two industry designations for an APT group that was discovered in August 2019 and was operating without detection for at least a year and...Go on to the site to read the full...
Are Open-source Security Tools Secure? Weighing The Pros And Cons
6th Oct 2020 [5 months ago] from InfoSec
Introduction There is a myth that good security solutions are necessarily expensive, but the truth is that there are many options, not only at low cost, but even excellent free tools that can be employed to protect most businesses. A good...
What Is A Cyber Range?
6th Oct 2020 [5 months ago] from InfoSec
Introduction When it comes to cyberthreats, it is not a matter of if, but when an organization is going to be targeted by cybercriminals. Will you and your organization be ready? Fortunately, the real thing does not have to be the first...
Microsoft Azure Fundamentals (AZ-900) Domains Overview
6th Oct 2020 [5 months ago] from InfoSec
Introduction The Microsoft Azure Fundamentals (AZ-900) certification exam is a great way for someone new to the field of cloud computing to demonstrate knowledge, interest and experience to current or potential employers. In this article,...
Hack The Box (HTB) Machines Walkthrough Series — Cascade (Part 1)
5th Oct 2020 [5 months ago] from InfoSec
Today, we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is the first half of an HTB machine named Cascade. HTB is an excellent...Go on to the site to read the full...
Microsoft Azure Certification: Overview And Career Path
5th Oct 2020 [5 months ago] from InfoSec
Introduction The global COVID-19 pandemic has forced individuals and organizations to adopt new ways of doing daily tasks, from working to learning. It has also accelerated the journey to the cloud...Go on to the site to read the full...
CCNA Certification Prep: Security Fundamentals
2nd Oct 2020 [5 months ago] from InfoSec
Introduction In modern networks, security is not an afterthought. You need to know how to build secure networks from the outset. Security has to be woven into the very fabric of the network.  The...Go on to the site to read the full...
ZION: 1.2 — VulnHub CTF Walkthrough (part 1)
1st Oct 2020 [5 months ago] from InfoSec
Introduction In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by André Henrique. Per the description given by the author, you must “Help...Go on to the site to read the full...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »