Monday, July 27, 2020
Posted by manager
Reader's rate:
5
Contributed by Kevin Thompson   Over the five years my organization has pursued becoming more organized in their information security program. To develop an effective program, the organization must start with the basics. Identify and categorize all company assets to effectively apply... + continue reading
Monday, July 27, 2020
Posted by manager
Reader's rate:
0
Contributed by Adam Yarborough Secrets management is an aspect of information security management needed for organizations of all sizes. Small organizations may leave all the important passwords in the control of the owner, where larger organizations may have multiple teams dedicated to different... + continue reading
Monday, July 27, 2020
Posted by manager
Reader's rate:
0
Contributed by David Brehmer Transformational technologies can change the information technology landscape at a high level. These technologies are known as disruptive. One of the fastest growing emerging technologies is the Internet of Things, or IoT. While IoT devices have existed for over... + continue reading
Monday, April 20, 2020
Posted by manager
Reader's rate:
0
Contributed by Andrew Price The progression of wireless technology over the years has been steadily evolving, and with it, so has wireless hacking. The number of per user wireless devices is increasing every day, and most of these devices contain personal identifiable information (PII). ... + continue reading
Thursday, March 26, 2020
Posted by manager
Reader's rate:
0
Contributed by Matthew Hester In the summer of 2016 the United Nations declared that access to the internet is a basic human right when it amended article 19 of the Universal Declaration of Human Rights. With this declaration the UN affirmed the increasing roles that technology plays in our day... + continue reading

Home Page

Featured Articles

Monday, 27/07/20 - 0 comment(s)
Contributed by Adam Yarborough Secrets management is an aspect of information security management needed for organizations of all sizes. Small organizations may leave all the important passwords in the control of the owner, where larger organizations may have multiple teams dedicated to different facets of information security. This paper will... + continue reading
Tuesday, 26/11/19 - 0 comment(s)
Contributed by Vinay Sawant VXLAN (Virtual Extensible Local Area Network) is the future of networking. Since the introduction of VXLAN from last three to four years into network infrastructure, almost all organizations are gradually migrating their network infrastructure to VXLAN.   This document is in PDF format. To view it click here. + continue reading

Red Tape

Monday, 27/07/20 - 0 comment(s)
Contributed by Kevin Thompson   Over the five years my organization has pursued becoming more organized in their information security program. To develop an effective program, the... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Friday, 24/05/19 - 0 comment(s)
Contributed by Josh Russell   In this paper I will be discussing the topic of securing databases. The importance of securing servers with databases, is that there is a lot of person or... + continue reading

Sistema

Monday, 27/07/20 - 0 comment(s)
Contributed by David Brehmer Transformational technologies can change the information technology landscape at a high level. These technologies are known as disruptive. One of the fastest... + continue reading

Et Cetera

Monday, 27/07/20 - 0 comment(s)
Contributed by Adam Yarborough Secrets management is an aspect of information security management needed for organizations of all sizes. Small organizations may leave all the important passwords in... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading