This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Generally speaking, the client-side web browser attack surface has been completely overlooked as a threat landscape except by malware authors, the hacking community, social media, and mass marketers. Every month one of our experts will provide advice and insights based on their extensive experience in the infosec industry.
Defining “storytelling” in an InfoSec context Inspiration - We the People: Democratizing Security “Storytelling” is a word that you will hear frequently within Duo’s creative team — now part of a Brand & Strategy unit for Cisco’s rebranded security organization Cisco Secure. But where to begin?
SC Media interviewed McMains to learn more about the parallels between sports and businesses, and how he’ll be coaching cybersecurity workers to successfully deal with pressure, overcome burnout, and bounce back from failure. How do you coach athletes or infosec experts to handle pressurized situations? Adversity is inevitable.
In 2006, BackTrack Linux happened which was based initially on Slax, then moved to Ubuntu. This was at a time when CD-R were at their peak, giving you 650-700 MB and USB media was not yet on the scene. This created BackTrack in May 2006. In information security (infosec) there is the need to be on the latest version.
Find out what Daniel looks for and how he does digital forensics using social media and other open source resources. While I produced this episode, a 21 year old Massachusetts National Guard airman is alleged to have photographed and distributed copies of classified US Military material on Discord, a social media site. You find clues.
There’s an online war in Ukraine, one that you haven’t heard much about because that country is holding its own with an army of infosec volunteers worldwide. RSAC also attracts some of the top researchers in infosec. I remember meeting Mikko in 2006. Alex banya. Good to see you Alex, thank you for taking the time.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content