Thursday, December 19, 2019
Posted by manager
Reader's rate:
5
Contributed by Mark Heckle Social Engineering is one of the most widely used methods by cybercriminals to penetrate many networks across the globe. This type of attack is an easy way for criminals to infiltrate the defenses of any organization. Social Engineering attacks seem to be increasing... + continue reading
Tuesday, November 26, 2019
Posted by manager
Reader's rate:
0
Contributed by Vinay Sawant VXLAN (Virtual Extensible Local Area Network) is the future of networking. Since the introduction of VXLAN from last three to four years into network infrastructure, almost all organizations are gradually migrating their network infrastructure to VXLAN.   This... + continue reading
Tuesday, November 26, 2019
Posted by manager
Reader's rate:
4
Contributed by Kristy James With the rise of global ransomware attacks, managing networks preventing those type of cyber-attacks in local governments can be challenging. Ransomware is defined as a type of malware that attackers use to infect computer networks. Malware is designed to gain... + continue reading
Tuesday, October 22, 2019
Posted by manager
Reader's rate:
0
Contributed by Gregory Boykin With the rapid expansion of internet access globally, Internet of Things (IoT) technologies have exploded onto the market, offering many connected and convenient devices to consumers and industry alike. With the proliferation of devices already connected and the... + continue reading
Tuesday, October 22, 2019
Posted by manager
Reader's rate:
4.5
Contributed by Mark Heckle In today’s environment, technology has become a way of doing business. Because of technology, information security has become a necessary factor in how we use technology in our companies. There are certainly ways to help protect the technology with additional... + continue reading

Home Page

Featured Articles

Tuesday, 26/11/19 - 0 comment(s)
Contributed by Vinay Sawant VXLAN (Virtual Extensible Local Area Network) is the future of networking. Since the introduction of VXLAN from last three to four years into network infrastructure, almost all organizations are gradually migrating their network infrastructure to VXLAN.   This document is in PDF format. To view it click here. + continue reading
Wednesday, 22/05/19 - 0 comment(s)
Contributed by Andres Castillo This paper will discuss the benefits and challenges of developing an environment of IIoT and Fog computing within a manufacturing environment. Identifying security concerns to include attack points and defending against black hats in their quest to infiltrate or introduce damaging software. We will discuss benefits... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Friday, 24/05/19 - 0 comment(s)
Contributed by Josh Russell   In this paper I will be discussing the topic of securing databases. The importance of securing servers with databases, is that there is a lot of person or... + continue reading

Sistema

Tuesday, 26/11/19 - 0 comment(s)
Contributed by Vinay Sawant VXLAN (Virtual Extensible Local Area Network) is the future of networking. Since the introduction of VXLAN from last three to four years into network infrastructure,... + continue reading

Et Cetera

Thursday, 19/12/19 - 0 comment(s)
Contributed by Mark Heckle Social Engineering is one of the most widely used methods by cybercriminals to penetrate many networks across the globe. This type of attack is an easy way for... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading