Home | Latest News | Popular News | Our Network | About | Contact
Security News from 'InfoSec' | www.SecurityPhresh.com
Security News from 'InfoSec'
Showing 'Security News from 'InfoSec'' from 1 to 10
Typo 1: VulnHub CTF Walkthrough (part 2)
22nd Oct 2020 [9 days ago] from InfoSec
Introduction In the previous article, Part 1 of this CTF, we were able to complete the following steps on the victim machine: Getting the target machine IP address by running the VM Getting open port details by using the Nmap tool Enumerating...
Reactive Vs. Proactive Security: Three Benefits Of A Proactive Cybersecurity Strategy
22nd Oct 2020 [9 days ago] from InfoSec
Introduction  I’ve been writing cybersecurity articles for many years, and in that time, I have only seen increasingly complex security threats. Cybercriminals take their craft seriously. They treat cybercrime as a business, looking...
Brand Impersonation Attacks Targeting SMB Organizations
21st Oct 2020 [10 days ago] from InfoSec
Introduction Building and maintaining a brand is an important part of a successful business. Having a recognized brand confers recognition, and if done well, provides a way of developing trust between customers and company. Brand trust...
How To Use The NICE Cybersecurity Workforce Framework To Plan Career Progression: A Practitioners’ Guide
21st Oct 2020 [10 days ago] from InfoSec
Introduction: An overview of the NICE Cybersecurity Workforce Framework In 2017, the National Institute of Standards and Technology (NIST) published Special Publication 800-181, the NICE Cybersecurity Workforce Framework (or NICE Framework);...
2020 Verizon Data Breach Investigations Report: Summary And Key Findings For Security Professionals
21st Oct 2020 [10 days ago] from InfoSec
Introduction The Verizon Data Breach Investigations Report, or the Verizon Data Breach Report, is an annual report intended for information security professionals. It summarizes 3,950 confirmed data breaches and is a collection of work...
Microsoft Azure Job Outlook
20th Oct 2020 [11 days ago] from InfoSec
Introduction The business world is relocating to the cloud and the trend is strong. It has been predicted that by the end of 2020, 83% of all businesses will be in the cloud and by 2021, the percentage of workloads processed in cloud data...
Cost Of Non-compliance: 8 Largest Data Breach Fines And Penalties
20th Oct 2020 [11 days ago] from InfoSec
Introduction Different regulations and laws will slap organizations with fines and penalties for data breaches. This is because the organization did not take the privacy of their data seriously. However, the authorities take this responsibility...
Implementing A Zero-trust Model: The Key To Securing Microservices
20th Oct 2020 [11 days ago] from InfoSec
Introduction Organizations are increasingly integrating microservices into their software development processes. As noted by DZone, microservices break down software into multiple component services, thereby enabling organizations to deploy...
Typo 1: VulnHub CTF Walkthrough (part 1)
19th Oct 2020 [12 days ago] from InfoSec
In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Akanksha Sachin Verma. As per the description given by the author, it is an intermediate-level challenge. The goal...
How To Avoid Getting Locked Out Of Your Own Account With Multi-factor Authentication
19th Oct 2020 [12 days ago] from InfoSec
Multi-factor authentication (MFA) is one of the most popular authentication security solutions available to organizations today. It really comes as no surprise, as the multi-factor authentication benefits of enhanced security go beyond...
1 2 3 4 5 6 7 8 9 10 Older »