New: itsecurityAll contenthive-129948hive-196917krzzanhive-183959steemhive-180932hive-166405photographyhive-185836uncommonlabhive-150122hive-183397hive-144064bitcoinlifehive-188619krsuccesshive-139150hive-101145hive-103599hive-124908hive-184714hive-145157hive-109690TrendingNewHotLikerscallnovo-cc (42)in hipaacompliance • 3 months agoMaster HIPAA Compliance: No.1 Strategies for Data Breach Response & Developing a Cyber Incident Response Plan for HealthcareThe significance of HIPAA compliance for medical providers cannot be overstated. In 2023, 37% of healthcare organizations lacked a comprehensive IT security plan (HIPAA Journal). A data…nandansinha (25)in dockersecurity • 5 months agoHow Can I Secure My Docker Environment?Ensuring the security of your Docker environment is crucial for maintaining smooth and safe operations. Docker has become an indispensable tool for managing application deployment lifecycles, but…iarminfo (25)in cybersecurity • 3 years agoStart-ups : Are you following Cyber Security hygiene? Key steps to start cyber hygiene practices for small businesses / startupsWhen it comes to cybersecurity hygiene, most startups remain in the same mindset. They are easy targets for hackers and they can be easily hacked. It has been proven statistically that startups tend…face2face (65)in hive-175254 • 5 years agoIs online education helps to hackers to collect data?These days online education has became a trend and everyone is enrolling to studying online through their Laptop, Personal Computer, Tab/iPad or Smartphone. Actually due to Covid19 pandemic students…firosolutions (38)in vulnerabilitiy • 5 years agoLightning ReleaseSummary We have released a new release that is improvingthe speed in our web interface a lot.As well as removing duplicate vulnerabilitieson focusing more on quality.You can check it out your self…satren (67)in deutsch • 5 years agoHumble Bundle - Hacking BundleVielleicht Interessiert es den ein oder anderen, für 15 Dollar(13 Euro) gibt es gerade 14 größtenteils gute oder zumindest brauchbare Bücher zu verschiedenen Themen aus der IT Security. Der…mediastudycenter (25)in cyberattacks • 7 years agoCyber Security Predictions- What to Expect in 2018#Advertising #LevelNet #tokensale : The company #LevelNet has become very promising, it is now profitable to invest in #ICO and increase its capital! Do not lose this opportunity! Earn while…somena (56)in trump • 7 years agoCurrent Top 3 "Bug Out" BooksSaanich Ethnobotany Applied Cryptography (2nd edition) John Ross's Unintended Consequencesilyess (35)in itsecurity • 7 years agoSteem IT Security : Luminosity RAT projection by governmentsThe authorities have shut down the famous Luminosity RAT, which is known to penetrate devices and can not be accessed by users anymore. In a joint operation, law enforcement authorities from…branniganslaw (27)in itsecurity • 7 years agoPrimer on the OpenSSL “Heartbleed” VulnerabilityThis is an older article I wrote somewhere else, but I felt that it might be helpful for people who wanted to learn a bit more about the vulnerability. While this is less of an issue now, it is the…branniganslaw (27)in podcasts • 7 years agoWhat Podcasts do you listen to?Over the years I have really come to enjoy a wide variety of podcasts. They provide such a wide variety of topics and personalities, and they are easily portable on your favorite device. Podcasts…branniganslaw (27)in technology • 7 years agosteemCreated with Sketch.Google Cloud ShellIf you have ever needed access to a Linux shell in the browser then you may be interested in the Google Cloud Shell: I only just found out about it, so I would bet that a lot of people have not…branniganslaw (27)in introduceyourself • 7 years agosteemCreated with Sketch.Hello WorldI just got started with Steemit, and so this is my introduction post, and as someone trained in computer programming I could think of no better way to start it, than with the traditional "Hello…ahka (48)in checkpoint • 7 years agoCheck Point Certified Security Expert ExamHello guys, There has been 18 days away from here. i was at course during this time. im going to take ccse exam tomorrow. Any luck wish will be apreciated. If here is anybody who is gonna take…jclohanx (33)in itsecurity • 7 years agoAttracting the younger generation to IT SecurityThe IT security field is growing rapidly. More and more stuff is being connected to the internet, and existing services are expanding at a rapid pace. Consequently, there is a growing demand for IT…crob98 (39)in technology • 7 years agoHow detect if a program is a virus without an antivirus | Come vedere se un programma è un virus senza un antivirusHave you ever downloaded a file with the fear of getting a virus? Well, I have. By googling on the Internet I discovered a way to found out if the downloaded program is a bad one. You may say…vector (25)in netsec • 7 years agoAndroid: Hack NFC-Credit-Cards (NFCproxy)vector (25)in netsec • 7 years agoMetasploit: Exploit Eternalblue (Windows 7 & Server 8r2 RCE) MS17-010sunnythakur9 (48)in security • 7 years agosteemCreated with Sketch.How to find a safe and trusted information technology source on internetAfter 2012 the Information technology system becoming a very important part of every company or individuals sectors. The Scam or fraud, unsecured and fake information resources are also growing with…secpoint (49)in secpoint • 8 years agoNew Advanced Vulnerability Scanning Reporting VideosNew Penetrator Features new advanced Vulnerability Scanning Reporting CLICK HERE ?? Be sure to subscribe to SecPoint's YouTube channel, watch some of the previous videos and…