Redefining the Meaning of Operational Risk

The definition of “operational risk” is variable, but it generally covers the risk of loss resulting from inadequate or failed internal processes, people and systems or from external events. I, however, want ...
> Download Now: GDPR Guide for Contact Centers <http://info.semafone.com/download-now-pci-compliance-checklist>

A Guide to GDPR Compliant Call Recordings

| | Blog
As if call and contact centers didn’t have enough regulations to worry about already, the European... The post A Guide to GDPR Compliant Call Recordings appeared first on Semafone ...
   via   the astounding cartoon capacity of   Daniel Stori   of   turnoff.us  !

Daniel Stori’s turnoff.us, ‘Developer Costumes’

via the astounding cartoon capacity of Daniel Stori of turnoff.us! Permalink ...

How Vendors Can Navigate the Challenges of Remote Support

A recent SecureLink survey found that for every technology vendor there are 239 customers who rely on their support. That’s a lot of people depending on your services – many of which ...
Golden Eye 1: CTF Walkthrough, Part 2

Golden Eye 1: CTF Walkthrough, Part 2

| | Hacking
In this article, we will continue the “GoldenEye” Capture-The-Flag challenge. This CTF was posted on VulnHub by its author, Creosote. As per the description given by the author, this is an... Go ...

Squashing Emotet: Responding to 2018’s Most Active Threat

|
Emotet is a destructive piece of malware that has undertaken numerous purposes over the years, including stealing data and eavesdropping on network traffic. Join our Consulting Director Sig Murphy, as he discusses ...

Squashing Emotet: Responding to 2018’s Most Active Threat

|
Emotet is a destructive piece of malware that has undertaken numerous purposes over the years, including stealing data and eavesdropping on network traffic. Join our Consulting Director Sig Murphy, as he discusses ...
Best Practices for Threat Hunting in Large Networks

Best Practices for Threat Hunting in Large Networks

| | Threat Hunting
When we think of modern threat hunting, we think about proactively looking for exceptional situations across the network. Rather than waiting for an incident to occur, threat hunters work... Go on to ...

Top 30 Malware Analyst Interview Questions and Answers for 2018

| | General Security
Introduction The importance of malware analysts in the world today needs no introduction. With that said, the questions that one may be asked on a job interview for this position do need ...
Loading...