Tags » IT Security

How to prepare for CEH exam?

IT Security

How to prepare for CEH exam?

If you are interested in getting CEH certificate, I have some recommendations as someone who has this certificate. 654 more words


To Delete Or Not To Delete — That Is The Question

Originally published on 3/28/18 at Forbes.

There seems to be confusion in corporate America about whether or not to delete data. On one hand, there are legal departments that advise keeping everything forever, and on the other are those that recommend deleting everything as a matter of policy as soon as possible — whacking away at files and folders on your file servers like a drunk landscaper whirling a weed whacker around your yard. 868 more words

Data Storage

Follow-up: The danger of neglecting civil rights / absurd events in Canada

In a positive development of the events discussed in a previous post, it appears that the charges have been dropped. (Cf. e.g. [1], … 1,001 more words

Una semana en seguridad del 23 al 29 de abril

Traducido de:

La semana pasada, se habló de la biometría conductual, se exploró una nueva variante de crossrider y se adoptó el poder del “no”. 131 more words

IT Security

Una semana en seguridad del 16 al 22 de abril

Traducido de:

La semana pasada, se habló acerca de Facebook y MySpace, se notó un cambio en el kit Magnitude exploit, donde comenzó a adoptar el ransomware GandCrab, se echó un buen vistazo a una nueva forma de adware que está basada en Python, se conversó un poco sobre el hacking ruso con un periodista, alentó a los minoristas a hacer las preguntas correctas para proteger sus negocios, e intervino en una forma de acelerar el ancho de banda de Internet y aumentar la privacidad a través del nuevo servicio DNS de Cloudflare. 299 more words

Cyber and Privacy Protection

Cyber space is expanding day by day and hence the chances of cyber attack. More and more internet users are stepping into the web of cyber space. 347 more words

Cyber Security Agencies In Delhi NCR

The Importance of Effective UEBA When Countering Insider Threats

While considering all of the problems experienced by today’s IT security team, the most difficult detection of threats is within the organization. Most of the tools are designed to protect the infrastructure from external risks and do not track the threats that are within the firewall. 657 more words

Information Security