Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 81 to 90
Darktrace And Vectra Product Overviews
22nd May 2019 [2 months ago] from InfoSec
Introduction It’s easy to see that the information security field is full of intrusion detection and prevention systems options. Two of the most popular products today are Darktrace and Vectra. This...Go on to the site to read the full...
The Difference Between AI And Machine Learning
21st May 2019 [2 months ago] from InfoSec
Introduction Some people use the terms “artificial intelligence” and “machine learning” interchangeably, but they’re not the same thing. To put it simply, artificial intelligence is a broad computer...Go on to the site to read...
Top 4 Cloud Security Certifications
21st May 2019 [2 months ago] from InfoSec
Introduction Certifications are often one of the top ways that employers use to screen candidates for high-powered tech jobs. As time goes on and new technologies emerge, organizations that host...Go on to the site to read the full...
Hack The Box (HTB) Machines Walkthrough Series — Canape
20th May 2019 [2 months ago] from InfoSec
Today, we will be continuing with our exploration of Hack the Box (HTB) machines as begun in the previous article. This walkthrough is of an HTB machine named Canape. HTB is an excellent platform...Go on to the site to read the full...
Protecting Customer Data At Contact Centers
20th May 2019 [2 months ago] from InfoSec
Ben Rafferty, chief innovation officer at Semafone, discusses how contact centers and the person-to-person interaction involved are a prime target for cybercriminals and what can be done to better protect sensitive customer information...
Are Your Communication Skills Holding Your Information Security Career Back?
20th May 2019 [2 months ago] from InfoSec
Introduction Going Beyond Talking Techie Back in 1999, the Mars Climate Orbiter came to a crash-and-burn end. Why? Because there had been a serious miscommunication concerning...Go on to the site to read the full article
Which States Have The Toughest Privacy Laws?
20th May 2019 [2 months ago] from InfoSec
Introduction Despite its high-tech advances, the United States lags behind other developed countries in protecting consumer privacy. Unlike most other developed countries, the United States only has...Go on to the site to read the full...
The Tech-hikers’ Guide To Outthinking Hackers
16th May 2019 [2 months ago] from InfoSec
Introduction “Cybersecurity! Don’t talk to me about cybersecurity!” is what Marvin the Paranoid Android would say if his diodes stopped hurting. But Marvin also complained about performing “trivial...Go on to the site to read the...
Hack The Box (HTB) Machines Walkthrough Series — Bashed
16th May 2019 [2 months ago] from InfoSec
We are continuing with our review of Hack the Box (HTB) machines. HTB is an excellent platform that hosts machines belonging to multiple OSes. It also has some other challenges as well. Individuals...Go on to the site to read the full...
What You Need To Know To Avoid Becoming A Phishing Scheme Victim
15th May 2019 [2 months ago] from InfoSec
Introduction A Lithuanian man is facing up to 30 years in prison this July for his role in a phishing scheme involving Facebook and Google. In March, he pled guilty to helping fleece the two...Go on to the site to read the full article
« Newer 4 5 6 7 8 9 10 11 12 13 Older »