Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 71 to 80
Carbon Black: Endpoint Security [product Review]
30th Nov 2018 [2 months ago] from InfoSec
Introduction Carbon Black Endpoint Security is an effective and user-friendly endpoint solution for user devices such as PCs and laptops. It features malware protection that keeps threats at bay...Go on to the site to read the full...
Are Third-Party Vendors Your Biggest Cybersecurity Risk? — CyberSpeak Podcast
30th Nov 2018 [2 months ago] from InfoSec
Fred Kneip, CEO of CyberGRX, talks about the security risks for companies that work with third-party vendors — those both globally focused and those closer to home. Want to learn more about third-party risk? Download our free whitepaper, "A...
Bug Bounty Programs: The Low-Down
29th Nov 2018 [2 months ago] from InfoSec
The global software industry is massive. Enterprise software alone is predicted to be worth $500 billion a year by 2022. Unless we live entirely off-grid, every part of our lives and work is touched...Go on to the site to read the full...
Smart Toys And Their Cybersecurity Risks: Are Our Toys Becoming A Sci-Fi Nightmare?
29th Nov 2018 [2 months ago] from InfoSec
In an episode of “The Twilight Zone” called “Living Doll,” a lifelike doll named Talky Tina turned rogue and terrorized a family. This nightmare scenario of out-of-control toys is sometimes portrayed...Go on to the site to read...
Threat Hunting: Data Collection And Analysis
29th Nov 2018 [2 months ago] from InfoSec
Introduction Threat hunting requires proactively looking within the network and searching for anomalies that might indicate a breach. The vast amount of data that needs to be collected and analyzed...Go on to the site to read the full...
Threat Hunting: Detecting Adversaries
29th Nov 2018 [2 months ago] from InfoSec
Introduction Threat hunting requires that the hunter understand the mind of the adversary and seek to take out attacks before the hunters can themselves be detected. So how is that exactly done, and...Go on to the site to read the full...
Information Security In Conflict Zones
29th Nov 2018 [2 months ago] from InfoSec
Introduction In today’s post GDPR-era, the citizens of most developed countries are regularly reminded by governments, media companies and non-governmental organizations of the importance of...Go on to the site to read the full...
Top 30 Microsoft Certified Systems Engineer (MCSE) Interview Questions And Answers
29th Nov 2018 [2 months ago] from InfoSec
Your Microsoft Certified Solutions Expert certification has gotten you in the door, and you’re about to have an interview for what could be your dream job. Nice! But are you ready for what comes...Go on to the site to read the full...
Cisco Advanced Malware Protection (AMP) For Endpoints [product Review]
29th Nov 2018 [2 months ago] from InfoSec
Introduction In today’s cyber-threat landscape, the network infrastructure is often viewed as a prized possession by the cyber-attacker. There are numerous reasons for this, one of them being that...Go on to the site to read the full...
McAfee: Endpoint Protection [product Review]
29th Nov 2018 [2 months ago] from InfoSec
Introduction Many businesses and corporations have traditionally only secured their network communications just after the point of origination and just before the point of destination. This means...Go on to the site to read the full...
« Newer 3 4 5 6 7 8 9 10 11 12 Older »