General Security

General Security

Vault 7 Leaks – inside the CIA secret kingdom (July-August 07)

Introduction Let’s continue to analyze the information contained in files leaked by the organization Wikileaks and allegedly originating from a network of the U.S. Central...

Innovative Methods of Information Security Training

Section 1. Introduction More and more organizations providing information security training apply integrative training, i.e., designing training programs that combine traditional classroom training with e-learning...

Patient Privacy in Healthcare: A Security Practitioner’s Approach

Data privacy, after years in the desert of “meh,” is becoming headline news. Data breaches, such as the recent one affecting up to 143...

Network Management for Next-Generation Wireless Security

Introduction In the good old days, ICT research used to be just about technology. The success of any research project could easily be measured in...

OWASP 2017 Top 10 vs. 2013 Top 10

After a long interval of four years, OWASP in April 2017 released a draft of its latest list of “Top 10 Web Application Security...

Using Verified Identity to Prevent Personal Data Breaches

Yet again, I open my laptop, check out the news, and see that there has been another mega-hack. This time the target was Equifax,...

The CCNA / CCNA Security / CCENT / CCDA Exams: Overview & Information

Introduction For those looking for an accelerated way to jump into the world of information security and networking, the CCNA/CCENT/CCDA/CCNA security quad certification program is...

Popular Articles

How to Find Reflected Cross Site Scripting Vulnerability

In our earlier tutorial, now we have realized about Reflected Cross Site Scripting and three fundamental steps to establish and detect Reflected Cross Site...