Lessons from Teaching Cybersecurity: Week 6

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a ...
keyboard and monitor

5 Essential Steps to Improve Cybersecurity Maturity

From small- and medium-sized organizations to large enterprises, every business is under continuous threat of security risk in today’s digital world. With the growing digital footprint and cloud adoption, organizations continue to ...
Efficient auditing with machine learning and Slither-simil

Efficient audits with machine learning and Slither-simil

by Sina Pilehchiha, Concordia University Trail of Bits has manually curated a wealth of data—years of security assessment reports—and now we’re exploring how to use this data to make the smart contract ...
OpenMined Privacy Conference - Day 1 - Part 2 Livestream

PrivacyRaven Has Left the Nest

By Suha S. Hussain, Georgia Tech If you work on deep learning systems, check out our new tool, PrivacyRaven—it’s a Python library that equips engineers and researchers with a comprehensive testing suite ...
automation

A Guide to Finding a Trusted MSSP

MSSPs can be essential in helping organizations complete their security posture. Here’s what to look for. Enterprises often lack the internal resources to do security right, especially considering tasks and responsibilities are ...
Security Boulevard
EH-Net - Chappell - Top 10 Uses of Wireshark for Hackers Part II

Top 10 Uses of Wireshark for Hackers Part II

In a world... OK, just kidding. This isn't a movie trailer. However, the ever-increasing sophistication of attacks on our networks is no joking matter. To bypass firewalls, IDS/IPS, EPS, DLP and a ...
EH-Net - Chappell - Top 10 Uses of Wireshark for Hackers Part I

Top 10 Uses of Wireshark for Hackers Part I

Wireshark fits nicely in any toolbox of the network forensic analyst and ethical hacker. From hundreds of dissectors that decode the protocol and application fields, to the customization capability that enables you ...
Open Source Security

Open Source Security: Can Security Be Open?

| | open source, security, tools
Open source security is emerging as an important new tool in the rapidly evolving world of software development The history of security looks like a cloak and dagger movie of the cold ...
Security Boulevard