New: informationsecurityAll contenthive-129948hive-196917krzzansteemhive-183959hive-180932photographyhive-166405hive-185836uncommonlablifehive-150122hive-183397hive-144064bitcoinhive-139150hive-188619krsuccesshive-103599hive-124908hive-101145hive-180301hive-109690hive-184714TrendingNewHotLikerscybercourses (28)in eccu • 6 months agoExecutive Leadership in Information Assurance (MSCS) | EC-Council UniversityIn an era where digital threats are ever-evolving and the stakes for information security are higher than ever, the need for skilled professionals in information assurance has never been more…anguslam (25)in cybersecurity • 2 years ago网络安全:保护个人信息的必要性随着互联网的普及和发展,网络安全问题越来越受到人们的关注。每天都有大量的个人信息在互联网上传输,如何保护这些信息已经成为一个紧迫的问题。在这篇专栏中,我将探讨网络安全的重要性以及如何保护个人信息。…tutorialboy (29)in cybersecurity • 2 years agoWhat is Web Fuzzing: How can Web Fuzzing useful in Pentest?Fuzzing is generally finding bugs/issues using automated scanning with supplying unexpected data into an application then monitoring it for exceptions/errors/stack traces. The motive is to supply…tutorialboy (29)in php • 2 years agoHow To Exploit PHP Remotely To Bypass Filters & WAF RulesThis is the first of two vulnerable PHP scripts that I’m going to use for all tests. This script is definitely too easy and dumb but it’s just to reproducing a remote code execution vulnerability…strongboxit (25)in strongboxit • 3 years agoWHAT IS GDPR?General data protection regulation (GDPR) is a law enacted by the European Union (EU) to dictate the transfer of sensitive data outside the European Union (EU) and European Economic Areas (EEA).…strongboxit (25)in security • 3 years agoRequirements for GDPR complianceKey privacy and data protection requirements for GDPR compliance ✔️Requiring the consent of subjects for data processing ✔️Anonymizing collected data to protect privacy ✔️Providing data…strongboxit (25)in security • 3 years agoGoals of NISTThe goals of NIST are threefold. To provide a comprehensive and flexible catalogue of controls for current and future protection based on changing technology and threats To develop a foundation…strongboxit (25)in strongboxit • 3 years agoWhat is NIST?NIST SP 800-53 NIST( National Institute of Standards and Technology) SP 800-53 is a set of metrics and guidelines that help organizations and contractors align with the requirements of FISMA.…strongboxit (25)in security • 3 years agoWhat is FISMA?Federal Information Security Management Act, FISMA, drafts the guidelines for federal organizations to develop, document, and implement an information security system. Modshield SB helps meet…strongboxit (25)in strongboxit • 3 years agoCase Study 3: Mass EngagementObjective Harden the systems to avoid exploits of zero-day attacks. To increase the monitoring of systems handling sensitive information. Exploited areas: Fabricate a Denial of Access using…strongboxit (25)in security • 3 years agoInformation security lifecycleInformation security lifecycle is a methodology that ensures a continuous, progressive and evolutionary journey within a firm's information security core principles. Identification Identification…rescueranjazz (36)in datadestruction • 3 years agoHappy Holidays from Horizon Alliance Technologies LLCHorizon Alliance Technologies is developing irreversible data destruction techniques to help digital natives and immigrants prevent identity theft with the possibility of recycling up to 90% of…gurukol (26)in cybersecurity • 3 years agoCyber Security | GurukolIt's 2021, Let's get to learn about Cyber Security. Gurukol!dj-sa (25)in strategy • 4 years agoTop Strategy Targets The HeartsIn criminology, there are three elements — motives, opportunities and means. To disrupt bad things, removing any of the three would work, but they’re not equal. That’s why a lot of places ban…anthonyadavisii (70)in esteem • 5 years agoEncrYPtIOn is fUtIlE - Debunking the Cult of John McAfeeJohn McAfee is one of the more bombastic and eccentric personalities in the crypto space. Besides making a wager to eat his own member based on a Bitcoin price prediction, he has also gained a…verhp11 (67)in blog • 5 years agoA victim of phishing, stupidity of sophisticated?Source The message above is about an IT person who has become a victim of phishing himself. Of course I don't know the background completely, but I can't imagine you fall for it. What…verhp11 (67)in stem • 5 years agoDo you harden your devices?I can imagine that some of you think "Harden?!" what the peep is that :) Well let me try to explain. Hardening is the proces where unused or not necesarry functions in Computer Operatingsystems…verhp11 (67)in blog • 5 years agoPenetration test vs. Vulnerability scanSource In the field of information security there are a lot of professionals at work, the business is booming and organizations want to be safe right?.... therefore a lot of organizations are…dailyvideos (52)in informationsecurity • 6 years agoDoes Linux Get Viruses In 2019 Who Makes Malware Viruses#DoesLinuxGetViruses #WhoMakesMalware #SecurityVulnerabilityAssessment #UniversalWebBrowserSecurityVulnerabilities #RemoteAccess #IsLinuxImmuneFromViruses #ComputerViruses #WinntiMalware…