Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 71 to 80
How To Become A Chief Information Security Officer — CyberSpeak Podcast
25th Jan 2019 [2 months ago] from InfoSec
Joshua Knight, cybersecurity business leader at Dimension Data, discusses his career journey as well as the steps you can take to move your career towards the path of a chief information security officer (CISO). Get infosec training: http://infosecinstitute.com....
Hack The Box (HTB) Machines Walkthrough Series – Optimum
24th Jan 2019 [2 months ago] from InfoSec
Today we will be continuing with our Hack the Box (HTB) machine series. This article contains the walkthrough of another HTB machine, this one named “Optimum.” HTB is an excellent platform that hosts...Go on to the site to read the...
Roles And Responsibilities Of The Information Security Manager
24th Jan 2019 [2 months ago] from InfoSec
Introduction After several years of job progression through an organization’s IT and information security chain of command, many will land many at the doorstep of what they were building their...Go on to the site to read the full...
Continuous Monitoring 101
23rd Jan 2019 [2 months ago] from InfoSec
Introduction What if there was a concept that would allow you insight into your IT and information security environment, showing you near real-time events and changes to your environment coupled with...Go on to the site to read the full...
Top 30 Cryptographer Interview Questions And Answers For 2019
23rd Jan 2019 [2 months ago] from InfoSec
Introduction What exactly is cryptography? How can one deploy it? For what purposes is it used? How can it be used to secure the confidential information and data of an organization? How can...Go on to the site to read the full article
If You Use Freelancers, Do You Need To Educate Them About Security Awareness?
22nd Jan 2019 [2 months ago] from InfoSec
Hopefully, your freelancers are security-aware. However, it is up to you to put policies into place to protect yourself from rogue or shoddy security practices by any employee, on-site or remote....Go on to the site to read the full...
A User’s Guide: 10 Ways To Protect Your Personal Data
22nd Jan 2019 [2 months ago] from InfoSec
In 2018, Facebook had to contact over 50 million users who had their personal data exposed in a security breach. This was on top of the 87 million Facebook users who had data sold to Cambridge...Go on to the site to read the full...
Top 30 Data Recovery Interview Questions And Answers For 2019
21st Jan 2019 [2 months ago] from InfoSec
Introduction Data recovery has become more important throughout the years as businesses and individuals have flocked to digital platforms for productivity and personal use. Because of this, there are...Go on to the site to read the full...
Building A Security Awareness Program For Small Businesses
21st Jan 2019 [2 months ago] from InfoSec
InfoSec Institute is dedicated to increasing security awareness and has an enormous repository of information to help individuals, small- and mid-sized businesses and enterprises to increase their...Go on to the site to read the full...
Community Cyber-Attacks, Simulations And Cooperation — CyberSpeak Podcast
19th Jan 2019 [2 months ago] from InfoSec
Michael Figueroa, executive director of the Advanced Cyber Security Center (ACSC), talks about aspects of red team operations and, more specifically, the ACSCs first collaborative defense simulation — an event that brought together 20...
« Newer 3 4 5 6 7 8 9 10 11 12 Older »