/f/workplace
- How to Build and Run a Security Operations Center
_gbhackers.com
-
|
posted in
rouiejay12
|
- New Cyber Training Unit Empowers Digital Defenders
_afcea.org
-
|
posted in
rouiejay12
|
- Maximizing a hybrid cloud approach with colocation
_helpnetsecurity.com
-
|
posted in
rouiejay12
|
- Researchers design a way to make encrypted keys harder to crack
_helpnetsecurity.com
-
|
posted in
rouiejay12
|
- Man-in-the-middle attack: Real-life example and video walkthrough
_resources.infosecinstitute.com
-
|
posted in
shirelywang
|
- theHarvester: a Classic Open Source Intelligence Tool
_securitytrails.com
-
|
posted in
shirelywang
|
- HIPAA vs. ISO 27001: What are the differences?
_advisera.com
-
|
posted in
shirelywang
|
- Introduction to Data Center Security
_cybrary.it
-
|
posted in
shirelywang
|
- AppSec experts share Burp Suite automation secrets and best practices
_portswigger.net
-
|
posted in
shirelywang
|
- The 5 Secrets Of A Mature Vulnerability Management Program
_hackerone.com
-
|
posted in
shirelywang
|
- SANS Security Awareness | Human Risk Assessments and Surveys | SANS Institute
_sans.org
-
|
posted in
shirelywang
|
- A Beast of Burden: 5 Reasons Your Data Governance Projects Have Stalled
_networkcomputing.com
-
|
posted in
shirelywang
|
- Reading the Application Security Tea Leaves – How to Interpret the Analyst Reports
_securityweekly.com
-
|
posted in
shirelywang
|
- Minimizing the risk of supply chain attacks – best practice guidelines
_news.sophos.com
-
|
posted in
shirelywang
|
- The Facebook Phone Numbers Are Now Searchable in Have I Been Pwned
_troyhunt.com
-
|
posted in
shirelywang
|
- Using the ATT&CK Matrix in real-time to understand threats and attacks
_securityweekly.com
-
|
posted in
shirelywang
|
- Daniel Kaminsky, Internet Security Savior, Dies at 42
_nytimes.com
-
|
posted in
shirelywang
|
- The World's Largest Hacking Conferences Are Back IRL This Summer
_vice.com
-
|
posted in
shirelywang
|
- VB2020 presentation: Behind the Black Mirror: simulating attacks with mock C2 servers
_virusbulletin.com
-
|
posted in
shirelywang
|
- Return to offices means new opportunities for phishing
_betanews.com
-
|
posted in
jmtiamz02
|
- Microsoft Office 365 Attacks on the Rise
_securityboulevard.com
-
|
posted in
jmtiamz02
|
- Only 12% of enterprises have fully embraced SASE
_helpnetsecurity.com
-
|
posted in
rouiejay12
|
- Your Guide to Becoming a Security Consultant
_onlinedegrees.sandiego.edu
-
|
posted in
jmtiamz02
|
- Defense Digital Service and HackerOne Initiate Third ‘Hack the Army’ Bug Bounty Challenge
_afcea.org
-
|
posted in
shirelywang
|
- The Most Wanted Security Certifications
_cybrary.it
-
|
posted in
Antoine
|
- Inspiring: CIA Rebrands to Attract Diverse Operatives
_vice.com
-
|
posted in
Mikhail
|