Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 51 to 60
Hyperspecialization In Cybersecurity | Cyber Work Podcast
11th Nov 2019 [26 days ago] from InfoSec
John Wheeler, Vice President of Security at Topcoder, and Cyber Work host Chris Sienko discuss hyperspecialization in cybersecurity and coding. View the transcript, additional episodes and promotional offers: https://www.infosecinstitute.com/podcast....
Network Traffic Analysis For Incident Response (IR): What Incident Responders Should Know About Networking
7th Nov 2019 [one month ago] from InfoSec
Introduction In this article, we’ll discuss the various things that incident responders must know about the operation of a network and how this can help improve how their security teams respond to...Go on to the site to read the full...
MITRE ATT&CK: Man-in-the-browser
7th Nov 2019 [one month ago] from InfoSec
Introduction Web browsing is a well-known cause of exposure to a variety of nasty pieces of malware and related maladies for web surfers. This is especially true if they are using pre-infected or...Go on to the site to read the full...
The Future Of Red Team Operations
7th Nov 2019 [one month ago] from InfoSec
Introduction The Red Team assessment is an increasingly popular method for an organization to get a realistic feel for their overall security. Organizations’ attack surfaces are large and constantly...Go on to the site to read the full...
Network Traffic Analysis For IR: Connection Analysis
6th Nov 2019 [one month ago] from InfoSec
Introduction to connection analysis Connection analysis is the highest-level type of network analysis that is used in incident response. Rather than developing and scanning with signatures of...Go on to the site to read the full...
Malware Spotlight: What Are Backdoors?
6th Nov 2019 [one month ago] from InfoSec
Introduction Imagine staring down an impregnable fortress or network and determining that there is no conceivable way in without obvious detection. You would probably trade half of the tools in your...Go on to the site to read the full...
MITRE ATT&CK: Input Capture
6th Nov 2019 [one month ago] from InfoSec
Introduction Since the early days of computing, input has been the most basic form of interface with a system. Until attackers find a way to intercept brain communications, input will remain the holy...Go on to the site to read the full...
Network Traffic Analysis For IR: Data Analysis For Incident Response
5th Nov 2019 [one month ago] from InfoSec
Introduction While no incident is the same, security professionals have come to rely on pre-established procedures and best practices to help contain a security breach and recover from it. Having an...Go on to the site to read the full...
Malware Spotlight: What Are Botnets?
5th Nov 2019 [one month ago] from InfoSec
Introduction They say simple plans are the most likely to be successful, and this adage definitely carries over to the world of cybersecurity. This old saying also applies to the world of attackers —...Go on to the site to read the full...
Switch Statements
5th Nov 2019 [one month ago] from InfoSec
Introduction Branching out in multiple ways, the switch statement appropriately dispenses execution to parts of code, based on the expressions value. A switch statement is a code construct...Go on to the site to read the full article
« Newer 1 2 3 4 5 6 7 8 9 10 Older »