Human factor remains one of the weakest links in maintaining proper cyber-hygiene in an enterprise. Unfortunately addressing risks posed by humans via training and retraining is often sacrificed on the altar of acquiring fancy security tools… don’t get me wrong, there is nothing wrong with acquiring security
Read more →Certified Information Security Manager [CISM] is a certification meant for professionals involved in IT security management and governance. The certification is offered by Information Systems Council Audit and Control Association [ISACA], a global organization involved in imparting the best practice for information systems management. Earning of CISM credential
Read more →What is a CISO? A CISO is the information security officer of an organization, who must tell organizations to create security policies, manage those policies, information, assets, and risks associated with them, and create security programs and awareness plans. What is the profile of a CISO? There
Read more →In this Kali Linux Tutorial, we are to work with Xerosploit. Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do DOS attacks and port
Read more →Introduction: Netcat is the Swiss army knife when it comes to TCP/IP, a utility used to open network connections commonly integrated into a wide range of apps. Because of the ease of its adaptability and high performance, it exists in several operating systems as command line service to know
Read more →How to move the company’s information system into the cloud: On the one hand, you hear that “everyone” is working, and on the other hand, you get stories about the big expenses of something that should actually save you money. It only remains to precisely assess your
Read more →Hello Everyone, Do you want to determine the owner of the domain name, IP address, and other bits and pieces? Querying with Whois is one of the solutions: 1) To find information organizational type (whois –h whois.ripe.net grant) 2) Domain Type (whois DomainName) 3) Specific IP Type
Read more →One of my challenges during my tenure in college was the discovery of new and creative ways to make learning and retention easier for myself. I made note of the positive effects of activities which created reinforcement, and a sense of confidence over the subject matter. Eventually,
Read more →Estimated reading time: 6 minutes Hello everyone and welcome to what I hope will be an “Agora” for security enthusiasts and to all people wishing to share a discussion and learn from what we discuss, or better, teach us and share with us their knowledge. In the
Read more →Estimated reading time: 3 minutes Health Care Security – Sharing Patient Data Translation provided by Google Translate. Original Portuguese Submission is available below the translation. I have observed over the past three years along with several organizations that directly or indirectly deal with patient data, dizzying growth,
Read more →