Non-Fungible Tokens: Of Course They're Attracting Scammers

Data Breach Today

Ownership of Digital Assets Selling for Large Amounts of Bitcoin? Cue Fraudster Love Anyone wanting to invent a system designed to stoke widespread abuse by fraudsters would be hard-pressed to best the non-fungible token.

IT 163

UK Reverses Course, Bans Huawei Gear From 5G Networks

Data Breach Today

Sanctions Against Chinese Firms a Factor in Decision The British government has officially reversed course and will now ban Huawei's telecom gear from its 5G networks.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cybrary ads new course on Global Privacy Management

IG Guru

Check out this course if you are interested in learning more on what it takes to develop and run a privacy program. The post Cybrary ads new course on Global Privacy Management appeared first on IG GURU.

6 Free Cybersecurity Training and Awareness Courses

Dark Reading

Most are designed to help organizations address teleworking risks related to COVID-19 scams

Risk 113

Open Source is Quickly—and Rightfully— Becoming Enterprise’s First Choice

Open source is not just a community, it’s a movement. And while its popularity has, of course, existed for decades, its accelerating growth in today’s enterprise is unmistakable. Find out why enterprises are going all-in on their open source strategy.

Zoom Reverses Course, Removes Local Web Server

Data Breach Today

Controversial Design Decision Could Allow for an Ambush Video Call Video conferencing vendor Zoom has opted to make major changes to its Mac application after a security researcher found several weaknesses in it. The changes come after the researcher refused a bug bounty and instead went public after 90 days, putting pressure on Zoom

IT 132

Update on Jamf Training courses and Training Passes


Over the last few weeks, our Curriculum and Content Development team has been hard at work to adapt our curriculum and course infrastructure to a remote delivery format. Read an update on these courses and Training Pass extensions


Zoom Changes Course on End-to-End Encryption

Dark Reading

The videoconferencing company now says it will offer end-to-end encryption to all users beginning in July

Course announcement: Tampering in Depth!

Adam Shostack

I’m excited to announce that I’m hitting my STRIDE and Linkedin has released the second course in my in-depth exploration of STRIDE: Tampering. I’m finding it fascinating to dive deep into the threats, organize my knowledge, and in doing so, hopefully help us chunk and remember what we’re learning. Security Software Engineering threat modeling

IT 43

New Video Course for State Agencies

The Texas Record

We are pleased to announce a new online video course for state agency records management officers and records liaisons. we are currently revamping local government online courses as well!). Click here to access the video on the course page. This 30 minute video course covers the basic concepts of records management: legal obligations, definitions, and how to read a retention schedule. Training eRecords records management officer RMO State Agencies TSLAC Video Course

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. However, there’s no team better suited to lead that charge than the marketing department.

5 Best Online Writing Courses


The post 5 Best Online Writing Courses first appeared on Cllax - Top of IT. Every writer wants to become a big shot someday. If you’re reading this, there’s a huge chance that you’ve been trying to unleash your inner Sidney Sheldon for a long.

IT 28

New Online Course For Local Governments

The Texas Record

SLRM is excited to announce the relaunch of our Introduction to Records Management Course for local governments! You may remember a previous iteration of the IRM course available on our training page. For the uninitiated, the IRM course is a self-paced multi-subject class that covers the fundamentals of records management. For information about our trainings (like how to enroll in a course), please see our Frequently Asked Questions.

Top cyber security courses for 2018

IT Governance

Find out how to pick the best training course and qualification to advance your cyber security career. Training courses are generally tailored to specific careers, so the first thing you need to decide is what aspect of cyber security interests you most. The even better news is that we offer a wide variety of training courses that each include a written exam and the chance to gain accredited certification.

New Pluralsight Course: Bug Bounties for Researchers

Troy Hunt

I wrote about that in the aforementioned post which went out in May and I mentioned back then that we'd also created a second course targeted directly at researchers. This course covers many of the issues folks considering getting involved in bug bounties often ask: How do they find bounties? This is only a 36-minute course and it's in the very casual Play by Play format (basically just Casey and I having a chat and sharing some screen content) so it's easy watching.

IT 62

New Pluralsight Course: Modern Browser Security Reports

Troy Hunt

Rounding out a recent spate of new Pluralsight courses is one final one: Modern Browser Security Reports. You may remember Scott from such previous projects as , Report URI and, as it relates to this course, our collective cleaning up at a couple of recent UK awards nights: With @Scott_Helme (at a different awards night) learning we both just scored at the European Cyber Security Blogger Awards!

New Pluralsight Course: OWASP Top 10, 2017

Troy Hunt

Just a tad over 5 years ago, I released my first ever Pluralsight course - OWASP Top 10 Web Application Security Risks for ASP.NET. More than 32k people have listened to more than 78k hours of content in this course making it not just the most popular course I've ever released, but also keeping it as my most popular in the library even today by a long way. Because this is a "Play by Play" course, it's only an hour and 12 minutes of easy listening.

New Pluralsight Course: Modern Web Security Patterns

Troy Hunt

Whilst this blog post is about a Pluralsight course I created with Lars Klint , it only really hit me during that bank conversation just how much there is to take onboard when it comes to securing things in the browser today. There were so many edge cases and angles not just to the security controls the folks at the bank had heard of before, but of course all those others that were entirely new to them.

IT 63

New Pluralsight Course: Bug Bounties for Companies

Troy Hunt

That's oversimplifying things, of course, but to me that's always been a cornerstone of why bug bounties make so much sense: they change the ROI of bugs such that it incentivises people of all ethical positions to disclose them to the organisation involved rather than run amuck with them. Which brings me to this: I'm sitting with Casey Ellis in a studio in San Franciso recording a Pluralsight course per the title of this blog post.

New Pluralsight Course: Emerging Threats in IoT

Troy Hunt

It's another Pluralsight course! It's another "Play by Play" course which means it's Lars and I sitting there having a conversation like this: We choose to talk about IoT because frankly, it's fascinating. And of course, they're just a tiny snippet of the broader set of things we're seeing go wrong with IoT. These Play by Play courses are easy watching.

IoT 63

CISMP training courses now available in Glasgow

IT Governance

High demand means we are now offering our CISMP training course in different locations, including Glasgow. The CISMP course is a great starting point for anyone looking to develop a career in information security as it provides a solid foundation upon which a successful information security career can be built. Our CISMP training course is delivered by an experienced cyber security consultant over five days and enables you to put your new knowledge and skills to work instantly.

BCS Data Protection Courses Available for 2019

Managing Your Information

What courses are available? Tkm Consulting is delighted to announce new data protection courses are available for 2019. We now have courses at a range of levels including those offered by BCS together with our own qualifications, which are approved and certificated by the Scottish Qualifications Authority (SQA). BCS Courses. A one day course for those that need an awareness of data protection legislation that they can apply to simple, common scenarios.

BCS Data Protection Courses Available for 2019!

Managing Your Information

What courses are available? Tkm is delighted to announce new data protection courses are available for 2019! We now have courses at a range of levels including those offered by BCS together with Tkm’s own qualifications, which are approved and certificated by the SQA. BCS Courses. A one day course for those that need an awareness of data protection legislation that they can apply to simple, common scenarios. A five day course plus work-based assignment.

CILIP launches new Short Course Accreditation


CILIP launches new Short Course Accreditation. CILIP, the library and information association, has launched a new accreditation scheme for short and modular courses. This book, written by the course trainers, was well received within the profession on publication.

Hack Yourself First Workshops in Australia, Denmark and Portugal (Virtually, of Course)

Troy Hunt

Of course it's virtual because let's face it, nobody is going anywhere at the moment. Plenty of you aren't even going into an office any more let alone fronting up to a conference with hundreds or even thousands of people.

Elevate AI Development by Applying MLOps Principles


Creating new services that learn from data and can scale across the enterprise involves three domains: software development, machine learning (ML) and, of course, data.

Collection Management: a Crash-Course

The Security Ledger

Thomas Hofmann, the Vice President of Intelligence at Flashpoint offers a crash-course in creating an effective collection management program. Effective collection management is integral to the success of an intelligence operation. What is it and how does it work? Collection management is one of the most overlooked and misunderstood aspects of an. Read the whole entry. »

IoT 40

SJSU Summer Course on Ethics for Archivists and IM Professionals approved for 10 continuing education credits for CRAs and CRMs

IG Guru

The post SJSU Summer Course on Ethics for Archivists and IM Professionals approved for 10 continuing education credits for CRAs and CRMs appeared first on IG GURU. Check out the link here.

5 best online cyber security training courses and certifications in 2020

IT Governance

With the coronavirus pandemic keeping us stuck inside and struggling to find ways to remain productive, now might be the perfect time to take an online cyber security training course. Let’s take a look at five of the best online courses for cyber security.

Jamf 100 Course 4.0: Here’s what’s new


Version 4.0 contains some key changes based on updates from Apple, Jamf and the Jamf Nation community’s feedback. Here’s what you can expect from the revamp


First Cultural Heritage Studies course receives CILIP accreditation


First Cultural Heritage Studies course receives CILIP accreditation.

Zoom Reverses Course and Promises End-to-End Encryption for All Users

WIRED Threat Level

The video conferencing platform had previously said that only paid accounts would get the feature—a move privacy advocates roundly decried. Security Security / Privacy

Achieve your professional potential with 15% off our courses

IT Governance

Whatever category you fall into, we have courses that will help you achieve your professional potential. To help you achieve your potential faster, we are currently offering 15% off all October and November courses if you book by 31 October. We offer courses in: GDPR and DPO. Simply add your required training course to your basket and the 15% discount will be automatically applied. Continual professional development is key in all industries.


Legalweek(year) 2021 Recap: Mapping Your Course For Managing Discovery With Collaboration Data

Hanzo Learning Center

Risk 52

New Pluralsight Course: Care and Maintenance of Development VMs

Troy Hunt

Regular readers will know I create a lot of Pluralsight courses. It's now 5 years ago I started writing my first one which incidentally, is still my highest rated course every month (apparently the OWASP Top 10 as it relates to ASP.NET is still a big thing). Most of the time, the courses I create are on topics I know well, primarily on security but occasionally with a bit of cloud and development practices sprinkled in for variety.

Cloud 63

Why Certification For Forklifts and Training Courses Are Very Important


The post Why Certification For Forklifts and Training Courses Are Very Important first appeared on Cllax - Top of IT. A forklift vehicle is the hardest to operate as well as one of the most essential too, working types of equipment in a business with product handling procedures.

IT 28

Amazon Alexa, Google Home On Collision Course With Regulation


Threatpost talks to Tim Mackey with Synopsys about recent Amazon Echo and Google Home privacy faux pas. Will GDPR and other regulations catch up to the voice assistants? IoT Podcasts Privacy Amazon Alexa amazon echo apple HomePod Data Privacy data retention Data security google home podcast Synopsys tim mackey voice assistant privacy


New Pluralsight Course: JavaScript Security Play by Play

Troy Hunt

So that's the course in a nutshell, "Play by Play: JavaScript Security" is now live! BTW - fun fact: Aaron was responsible for introducing me to the folks at Pluralsight back in 2012 which ultimately led to many courses and my independence from corporate life and indeed, life as I know it today. Ah JavaScript, the answer to - and cause of - all our problems on the web today! Just kidding, jQuery has solved all our JS problems now.

A Short Cybersecurity Writing Course Just for You

Lenny Zeltser

My new writing course for cybersecurity professionals teaches how to write better reports, emails, and other content we regularly create. It’s a course I wish I could’ve attended when I needed to improve my own security writing skills. I titled the course The Secrets to Successful Cybersecurity Writing: Hack the Reader. For example: The course will help you stand out from other cybersecurity professionals with similar technical skills.

University of Michigan “Data Science Ethics” 4-Week Course Offered for Free via Coursera

IG Guru

This course is offered for free on Coursera. The post University of Michigan “Data Science Ethics” 4-Week Course Offered for Free via Coursera appeared first on IG GURU. Artificial Intelligence Business Education Information Governance Algorithms Big Data Data Ethics Fair Information Practices Principles Act