Security Bloggers Network

Security Bloggers Network – Weekly Top 10

What’s new

Consider Cybersecurity topics, authors and tags that you are interested in when trying to search. You can also enter your own custom search criteria. You can also click a topic below to filter all the blog posts.

unification.png

XKCD, Unification

Permalink …
/
Infosecurity.US
2018 AppSec California: “Unpoisoned Fruit: Seeding Trust into a Growing World of Algorithmic Warfare”

2018 AppSec California: “Unpoisoned Fruit: Seeding Trust into a Growing World of Algorithmic Warfare”

My latest presentation on securing big data was at the 2018 AppSec California conference: When: Wednesday, January 31, 3:00pm – 3:50pm Where: Santa Monica Event Link: Unpoisoned Fruit: Seeding Trust into a Growing World of Algorithmic Warfare Artificial Intelligence, or …
/
flyingpenguin
The Top 25+ Information Security Events and Conferences of 2018

The Top 25+ Information Security Events and Conferences of 2018

Information security (InfoSec) conferences are a great way to become familiar with new developments and later trends in technology, as well as be made aware of the recent products and services to… Go on to the site to read the …
/
InfoSec Resources
Project Lakhta: Russian Meddling Gets Russians Indicted

Project Lakhta: Russian Meddling Gets Russians Indicted

The U.S. Department of Justice (DoJ) announced Feb.16 that a Federal grand jury dropped the hammer on a gaggle of Russian citizens and three Russian entities for their hand in the meddling in the U.S. presidential election of 2016. This …
/
Security Boulevard
Top Ten Information Security Thought Leaders

Top Ten Information Security Thought Leaders

Living in an information age can be daunting. Even if you manage to cut out the noise of social media, and the unceasing barrage of ads, there is still an element of digital dependence that can… Go on to the …
/
InfoSec Resources
Top Five Open Source Intelligence (OSINT) Tools

Top Five Open Source Intelligence (OSINT) Tools

In this article, we will look at top five Open Source Intelligence tools. Before we jump directly on tools, it is essential to understand what is Open Source Intelligence(OSINT) and how it can… Go on to the site to read …
/
InfoSec Resources
The Top 5 Penetration Testing Tools and Their Reporting Features

The Top 5 Penetration Testing Tools and Their Reporting Features

Introduction In the Cybersecurity world today, there is one methodology that has proven to be quite effective in determining the security vulnerabilities of any business entity: Penetration Testing…. Go on to the site to read the full article …
InfoSec Resources
Virtual Azure® Active Directory®

Virtual Azure® Active Directory®

Admins have been looking for a cloud version of Active Directory® for a while. Many think of Azure® as just that. But is a virtual Azure Active Directory instance really… The post Virtual Azure® Active Directory® appeared first on JumpCloud …
/
JumpCloud
wall of faces.jpg

Ubuntu, The Collector

Martin Brinkmann, writing at gHacks, illuminateds the questionable data gathering efforts by Canonical, producers of Ubuntu Linux. Read Martin’s concise examination of the issue, of which, most certainly is Today’s Must Read. Permalink …
/
Infosecurity.US

Loading...