Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 81 to 90
Webinar: Getting Started In Digital Forensics
28th Mar 2019 [2 months ago] from InfoSec
The post Webinar: Getting started in digital forensics appeared first on Infosec Resources. Webinar: Getting started in digital forensics was first posted on March 28, 2019 at 2:59 pm. 2017...Go on to the site to read the full article
The Dangers Of “Rolling Your Own” Encryption
28th Mar 2019 [2 months ago] from InfoSec
Why It Takes a Community to Create Good Encryption What would our online world be like without cryptography? For a start, security as we know it would not exist. We use (or should use) encryption...Go on to the site to read the full...
Knowledge Management In Cybersecurity
28th Mar 2019 [2 months ago] from InfoSec
Data has been called “the new oil.” Ensuring that the right people have access to the data that they need, and that users cannot access sensitive data without proper authorization, is an important...Go on to the site to read the full...
Saving Lives With ICS And Critical Infrastructure Security
28th Mar 2019 [2 months ago] from InfoSec
Emily Miller, director of national security and critical infrastructure programs at Mocana, discusses her passion for critical infrastructure security and how securing industrial Internet-of-Things (IoT) devices is really about saving lives....
PowerShell For Pentesters, Part 5: Remoting With PowerShell
27th Mar 2019 [2 months ago] from InfoSec
Introduction In part five of our series on PowerShell for pentesters, we will discuss a very important subject: the process of remoting with PowerShell. Remoting will allow us to execute PowerShell...Go on to the site to read the full...
Information Collection In Cybersecurity
27th Mar 2019 [2 months ago] from InfoSec
The NICE framework is designed by NIST to provide a common vocabulary and definitions for various cybersecurity jobs and skill sets. Within the framework, various different jobs are defined, and the...Go on to the site to read the full...
CyberSeek Career Pathway: Cyber Crime Analyst/Investigator (Entry-level Position)
27th Mar 2019 [2 months ago] from InfoSec
Interested in a cybersecurity career that puts you on the cutting edge of computer forensics and fighting cybercrime? If you answered “yes,” then the Cyber Crime Analyst/Investigator role might be...Go on to the site to read the full...
Provably Secure Operating Systems
26th Mar 2019 [2 months ago] from InfoSec
The operating system: the fundamental part of our computing environment. It is the mothership that controls the software and hardware applications that provide the tools of computing. But the...Go on to the site to read the full...
CyberSeek Career Pathway: Cybersecurity Specialist/Technician (Entry-Level)
26th Mar 2019 [2 months ago] from InfoSec
Introduction When it comes to starting a career in the cybersecurity field, you have many options to choose from, but only one will be the right fit. CyberSeek’s Career Pathway tool is here to help...Go on to the site to read the full...
Virtual Machine Introspection In Malware Analysis – Use Case
26th Mar 2019 [2 months ago] from InfoSec
To determine the behavior of a piece of malware, we will develop a script (based on LibVMI functions) that will allow us to trace the Kernel APIs executed by a malware and their arguments. 1....Go on to the site to read the full...
« Newer 4 5 6 7 8 9 10 11 12 13 Older »