Wednesday, July 31, 2019
Posted by manager
Reader's rate:
0
Contributed by James Robinson Appropriate and proper understanding and of IT security should be considered an essential and pertinent requirement within any modern business amongst its executives and employees. But, as we have seen throughout recent news, this has not been the case for many... + continue reading
Tuesday, July 23, 2019
Posted by manager
Reader's rate:
3
Contributed by Mark E. Turner Security threats continue to present challenges to both private and public sectors. Evidence of this problem is provided in daily news reports of data breaches involving private citizens data. Information security Management (ISM) has become the largest growing field... + continue reading
Monday, July 22, 2019
Posted by manager
Reader's rate:
0
Contributed by James McKinney It can be argued that today’s society not only thieves but is also more efficient due in part to mobile technology. As with all technology, mobile technology came with vulnerabilities that malfeasant individuals were keen to exploit. The use of personal mobile... + continue reading
Tuesday, May 28, 2019
Posted by manager
Reader's rate:
0
Contributed by Brian May decryption should be deployed in your enterprise environment, next generation firewalls (NGFW) must first be explained. In short a NGFW is a network appliance that packages together multiple security functions that range from firewall, IPS/IDS, URL filtering, spam... + continue reading
Friday, May 24, 2019
Posted by manager
Reader's rate:
0
Contributed by Josh Russell   In this paper I will be discussing the topic of securing databases. The importance of securing servers with databases, is that there is a lot of person or sensitive data store on it. In today’s world, almost everything is stored online. People pay bills... + continue reading

Home Page

Featured Articles

Wednesday, 22/05/19 - 0 comment(s)
Contributed by Andres Castillo This paper will discuss the benefits and challenges of developing an environment of IIoT and Fog computing within a manufacturing environment. Identifying security concerns to include attack points and defending against black hats in their quest to infiltrate or introduce damaging software. We will discuss benefits... + continue reading
Tuesday, 14/05/19 - 0 comment(s)
Contributed by Chris Choyce This paper will define and analyze injection attacks and dive into why the attack surface is one of the largest available for adversaries. There are several types of injection attacks and they all involve the manipulation of code at a public available “doorway” to the data store that is threatened. The two... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Friday, 24/05/19 - 0 comment(s)
Contributed by Josh Russell   In this paper I will be discussing the topic of securing databases. The importance of securing servers with databases, is that there is a lot of person or... + continue reading

Sistema

Monday, 22/07/19 - 0 comment(s)
Contributed by James McKinney It can be argued that today’s society not only thieves but is also more efficient due in part to mobile technology. As with all technology, mobile technology came... + continue reading

Et Cetera

Tuesday, 28/05/19 - 0 comment(s)
Contributed by Brian May decryption should be deployed in your enterprise environment, next generation firewalls (NGFW) must first be explained. In short a NGFW is a network appliance that packages... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading