Wednesday, January 29, 2020
Posted by manager
Reader's rate:
0
Contributed by Richard Parker Risk Management is the process whereby an organization identifies the risk, makes an assessment of the risk, identifies any mitigation that can be done to control the risk, and then decides to accept the risk or not to accept the risk. It applies to everything we do... + continue reading
Monday, January 27, 2020
Posted by manager
Reader's rate:
0
Contributed by Brian S. Rodgers Exploring and understanding software defined services, hosted locally or off premise in a cloud provider’s data center, is a critical task demands the Information Security (InfoSec) practitioner’s attention. A strong password and sturdy door locks... + continue reading
Thursday, December 19, 2019
Posted by manager
Reader's rate:
5
Contributed by Mark Heckle Social Engineering is one of the most widely used methods by cybercriminals to penetrate many networks across the globe. This type of attack is an easy way for criminals to infiltrate the defenses of any organization. Social Engineering attacks seem to be increasing... + continue reading
Tuesday, November 26, 2019
Posted by manager
Reader's rate:
0
Contributed by Vinay Sawant VXLAN (Virtual Extensible Local Area Network) is the future of networking. Since the introduction of VXLAN from last three to four years into network infrastructure, almost all organizations are gradually migrating their network infrastructure to VXLAN.   This... + continue reading
Tuesday, November 26, 2019
Posted by manager
Reader's rate:
4
Contributed by Kristy James With the rise of global ransomware attacks, managing networks preventing those type of cyber-attacks in local governments can be challenging. Ransomware is defined as a type of malware that attackers use to infect computer networks. Malware is designed to gain... + continue reading

Home Page

Featured Articles

Tuesday, 26/11/19 - 0 comment(s)
Contributed by Vinay Sawant VXLAN (Virtual Extensible Local Area Network) is the future of networking. Since the introduction of VXLAN from last three to four years into network infrastructure, almost all organizations are gradually migrating their network infrastructure to VXLAN.   This document is in PDF format. To view it click here. + continue reading
Wednesday, 22/05/19 - 0 comment(s)
Contributed by Andres Castillo This paper will discuss the benefits and challenges of developing an environment of IIoT and Fog computing within a manufacturing environment. Identifying security concerns to include attack points and defending against black hats in their quest to infiltrate or introduce damaging software. We will discuss benefits... + continue reading

Red Tape

Wednesday, 29/01/20 - 0 comment(s)
Contributed by Richard Parker Risk Management is the process whereby an organization identifies the risk, makes an assessment of the risk, identifies any mitigation that can be done to control the... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Friday, 24/05/19 - 0 comment(s)
Contributed by Josh Russell   In this paper I will be discussing the topic of securing databases. The importance of securing servers with databases, is that there is a lot of person or... + continue reading

Sistema

Tuesday, 26/11/19 - 0 comment(s)
Contributed by Vinay Sawant VXLAN (Virtual Extensible Local Area Network) is the future of networking. Since the introduction of VXLAN from last three to four years into network infrastructure,... + continue reading

Et Cetera

Monday, 27/01/20 - 0 comment(s)
Contributed by Brian S. Rodgers Exploring and understanding software defined services, hosted locally or off premise in a cloud provider’s data center, is a critical task demands the... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading