Home | Latest News | Popular News | Our Network | About | Contact
Security Papers & Presentations | www.SecurityPhresh.com
Security Papers & Presentations
Showing 'Security Papers & Presentations' from 81 to 90
What Is The NICE Cybersecurity Workforce Framework?
29th Jul 2020 [2 months ago] from InfoSec
Introduction: All about the NCWF The National Initiative for Cybersecurity Education (NICE), led by the National Institute of Standards and Technology (NIST), is a partnership between government,...Go on to the site to read the full...
Data Execution Prevention (DEP) In Windows 10
29th Jul 2020 [2 months ago] from InfoSec
Introduction Does this sound familiar? Sorry, not on the list. Oh come on! I was just in there five minutes ago! I just need to go get my coat. Not on the...Go on to the site to read the full article
How To Use Disk Quotas In Windows 10
28th Jul 2020 [2 months ago] from InfoSec
Introduction Lets say for a moment that its been a big family dinner and youve got one massive pie left for dessert. You ask who wants pie, and four people each say they want...Go on to the site to read the full article
The False Claims Act And Cybersecurity: Are Third-party Vendors Putting You At Risk?
28th Jul 2020 [2 months ago] from InfoSec
Introduction A government supplier law written over a century ago may seem outdated in the digital age, but it may be putting your company at risk. Recent court rulings related to the 1863 False...Go on to the site to read the full...
Are Apps Stealing Company Secrets? Smart Device Privacy Concerns For Businesses
28th Jul 2020 [2 months ago] from InfoSec
Introduction Privacy often feels like it is something that can be bought, sold and/or simply ignored. So many people use the old and worn argument: “If you have nothing to hide, why worry about...Go on to the site to read the full...
SQL Injection Vulnerabilities
28th Jul 2020 [2 months ago] from InfoSec
Databases and the structured query language A database is designed to store data in an understandable and easily accessible way. Data is organized into tables, rows and columns, making it easy to...Go on to the site to read the full...
How To Use AppLocker In Windows 10
27th Jul 2020 [2 months ago] from InfoSec
What is AppLocker? AppLocker is an application whitelisting feature which helps an organization to control what apps and files can be run by the user. AppLocker was first introduced with Windows 7...Go on to the site to read the full...
HackNos Player 1.1: CTF Walkthrough
27th Jul 2020 [2 months ago] from InfoSec
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Rahul Gehlot. As per the description given by the author, this is an...Go on to the site to read the full...
Coronavirus Predictions: What Are The Long-term Workplace Implications Of COVID-19?
27th Jul 2020 [2 months ago] from InfoSec
Introduction: What will the world look like after the COVID-19 vaccine? Human societies are often challenged by events out of our control. Extreme weather events happen and take with them many...Go on to the site to read the full...
Are There Any New Cybersecurity Threats That Come With 5G Technology?
23rd Jul 2020 [2 months ago] from InfoSec
Introduction  5G technology has long been a source of controversy over health and security concerns. This is particularly true because the introduction of an open, all-software defined network will...Go on to the site to read the full...
« Newer 4 5 6 7 8 9 10 11 12 13 Older »