InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by Infosec
Aktualizace: 20 min 8 sek zpět

Online certification opportunities: 4 more vendors offer online certification exams

25 Srpen, 2020 - 15:00

Introduction: Get certified from home during the COVID-19 pandemic Enabling employees to work from home during the COVID-19 outbreak has not only allowed employers to ensure the safety and well-being of staff with less impact on productivity and operations. It has also provided an occasion to upskill their current talents by allowing them to engage […]

The post Online certification opportunities: 4 more vendors offer online certification exams appeared first on Infosec Resources.

Online certification opportunities: 4 more vendors offer online certification exams was first posted on August 25, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Symmetric Cryptography

24 Srpen, 2020 - 23:14

Introduction to symmetric cryptography Symmetric cryptography gets its name from the fact that the same secret key is used for encryption and decryption, thus making the process symmetrical. The main advantage of symmetric cryptography over asymmetric cryptography is that it tends to be faster and more efficient. The main disadvantage is that for symmetric cryptography […]

The post Symmetric Cryptography appeared first on Infosec Resources.

Symmetric Cryptography was first posted on August 24, 2020 at 4:14 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Improper Error Handling

24 Srpen, 2020 - 22:13

Introduction to error handling Every application has the potential for an error to occur. Even if an application is completely standalone, there is the potential that a fault will occur with the computer’s CPU or RAM that could affect execution. Handling errors correctly is essential to the security of an application. If an error occurs […]

The post Improper Error Handling appeared first on Infosec Resources.

Improper Error Handling was first posted on August 24, 2020 at 3:13 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 20 Security Awareness Posters with messages that STICK

24 Srpen, 2020 - 15:05

Introduction – Security Awareness Posters with messages that STICK The importance of security awareness in modern business practice can’t be overstated. It needs to be a priority in every security plan. Each employee is a front-line defender against incoming threats, and the danger comes in the most unexpected way. That’s why so much money is […]

The post Top 20 Security Awareness Posters with messages that STICK appeared first on Infosec Resources.

Top 20 Security Awareness Posters with messages that STICK was first posted on August 24, 2020 at 8:05 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

FBI, DHS & CISA report summarizes top 10 exploited vulnerabilities

24 Srpen, 2020 - 15:00

Introduction: The US federal agencies helping to protect your systems from exploits According to the Cybersecurity and Infrastructure Security Agency (CISA), foreign cyber actors often exploit software vulnerabilities that have been already addressed, banking on the fact that patches are not always timely applied. Public and private sector organizations can do much to impair foreign […]

The post FBI, DHS & CISA report summarizes top 10 exploited vulnerabilities appeared first on Infosec Resources.

FBI, DHS & CISA report summarizes top 10 exploited vulnerabilities was first posted on August 24, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security