Sunday, September 30, 2018
Posted by manager
Reader's rate:
0
Contributed by Vinay Sawant and Information Security administrator, Network and Information Security Manager, and Chief Information Security Officer (CISO) will have. This research paper discusses about various Computers and Networking related security threats and vulnerabilities in enterprise... + continue reading
Sunday, September 30, 2018
Posted by manager
Reader's rate:
0
Contributed by Vinay Sawant VXLAN was introduced about two to three years ago and since its inception, it is becoming more popular and technology of the choice for most of the organizations. In this research paper we are discussing about: - Why we need VXLAN? What problems VXLAN solves? It... + continue reading
Saturday, September 8, 2018
Posted by manager
Reader's rate:
0
Contributed by Brian Martin The purpose of this paper is to show how crucial network security is to an organization by showing various attacks a network could face and by offering some solutions and best practices to help guard against them. In today’s environment, cyber threats are growing... + continue reading
Sunday, September 2, 2018
Posted by manager
Reader's rate:
0
Contributed by Bryan Brzezinski Cisco ISE or Identity Services Engine, “is a next generation identity and access control policy platform” (1) It allows for a single point for implementing access control policy in an entire company or organization by combining security protocols... + continue reading
Sunday, September 2, 2018
Posted by manager
Reader's rate:
0
Contributed by Tom Mercer Remote Management and Monitoring platforms (RMMs) are quickly becoming one of the most popular information security management tools. These platforms provide information security (InfoSec) managers with superior visibility of assets (servers, networking equipment,... + continue reading

Home Page

Featured Articles

Tuesday, 20/03/18 - 0 comment(s)
Contributed by David Balaban One can easily find weak points and vulnerabilities virtually everywhere: our bodies are vulnerable to viruses and weak in front of the eternity, and there’s a lot of weak points in our memory and our mind. All the software solutions we create are also imperfect. In this article, I will try to address matters... + continue reading
Sunday, 18/03/18 - 0 comment(s)
Contributed by David Mitchell Enterprises and companies have depended on private networks, such as private T1 access to MPLS service for their bandwidth performance. The high cost of these services has encouraged the technology industries to develop some cheaper solutions as technology evolved. The support of more demanding real-time... + continue reading

Red Tape

Sunday, 26/08/18 - 0 comment(s)
Contributed by David McDaniel Since antiquity, humans have required the need to protect sensitive data. Whether for national security, financial, or a myriad of personal reasons, information... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Tuesday, 05/06/18 - 0 comment(s)
Contributed by Timothy E. Robinson For quite some time now, I have been interested in the computer engineering. I particularly enjoyed processor design and implementation. Designing and building x86... + continue reading

Sistema

Sunday, 02/09/18 - 0 comment(s)
Contributed by Awojana Tolulope   Results have proven over the years that more than 90 percent of successful Internet-based attacks exploit software applications which were inappropriately... + continue reading

Et Cetera

Sunday, 30/09/18 - 0 comment(s)
Contributed by Vinay Sawant and Information Security administrator, Network and Information Security Manager, and Chief Information Security Officer (CISO) will have. This research paper... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading