Zoom Reverses Course, Removes Local Web Server

Data Breach Today

Controversial Design Decision Could Allow for an Ambush Video Call Video conferencing vendor Zoom has opted to make major changes to its Mac application after a security researcher found several weaknesses in it.

IT 196

Course announcement: Tampering in Depth!

Adam Shostack

I’m excited to announce that I’m hitting my STRIDE and Linkedin has released the second course in my in-depth exploration of STRIDE: Tampering.

IT 56

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Top cyber security courses for 2018

IT Governance

Find out how to pick the best training course and qualification to advance your cyber security career. Training courses are generally tailored to specific careers, so the first thing you need to decide is what aspect of cyber security interests you most.

La course aux talents technologiques

DXC Technology

Les entreprises peinent de plus en plus à trouver les talents dotés des compétences nécessaires qui les aideront à réussir leur transformation digitale. Ce déséquilibre entre l’offre et la demande crée une situation imparfaite pour les entreprises, qui, pour rester compétitives, sont obligées d’investir considérablement dans la gestion et l’acquisition des compétences. Parmi les compétences […]. Digital Transformation Leadership and Success Workplace

BCS Data Protection Courses Available for 2019!

Managing Your Information

What courses are available? Tkm is delighted to announce new data protection courses are available for 2019! We now have courses at a range of levels including those offered by BCS together with Tkm’s own qualifications, which are approved and certificated by the SQA.

CISMP training courses now available in Glasgow

IT Governance

High demand means we are now offering our CISMP training course in different locations, including Glasgow. Our CISMP training course is delivered by an experienced cyber security consultant over five days and enables you to put your new knowledge and skills to work instantly.

New Video Course for State Agencies

The Texas Record

We are pleased to announce a new online video course for state agency records management officers and records liaisons. we are currently revamping local government online courses as well!). Click here to access the video on the course page.

Achieve your professional potential with 15% off our courses

IT Governance

Whatever category you fall into, we have courses that will help you achieve your professional potential. To help you achieve your potential faster, we are currently offering 15% off all October and November courses if you book by 31 October. We offer courses in: GDPR and DPO.


A Short Cybersecurity Writing Course Just for You

Lenny Zeltser

My new writing course for cybersecurity professionals teaches how to write better reports, emails, and other content we regularly create. It’s a course I wish I could’ve attended when I needed to improve my own security writing skills.

New Pluralsight Course: OWASP Top 10, 2017

Troy Hunt

Just a tad over 5 years ago, I released my first ever Pluralsight course - OWASP Top 10 Web Application Security Risks for ASP.NET. More than 32k people have listened to more than 78k hours of content in this course making it not just the most popular course I've ever released, but also keeping it as my most popular in the library even today by a long way. Because this is a "Play by Play" course, it's only an hour and 12 minutes of easy listening.

New Online Course For Local Governments

The Texas Record

SLRM is excited to announce the relaunch of our Introduction to Records Management Course for local governments! You may remember a previous iteration of the IRM course available on our training page. For the uninitiated, the IRM course is a self-paced multi-subject class that covers the fundamentals of records management. For information about our trainings (like how to enroll in a course), please see our Frequently Asked Questions.

Collection Management: a Crash-Course

The Security Ledger

Thomas Hofmann, the Vice President of Intelligence at Flashpoint offers a crash-course in creating an effective collection management program. Effective collection management is integral to the success of an intelligence operation. What is it and how does it work? Collection management is one of the most overlooked and misunderstood aspects of an. Read the whole entry. »

IoT 40

New Pluralsight Course: Bug Bounties for Researchers

Troy Hunt

I wrote about that in the aforementioned post which went out in May and I mentioned back then that we'd also created a second course targeted directly at researchers. This course covers many of the issues folks considering getting involved in bug bounties often ask: How do they find bounties? This is only a 36-minute course and it's in the very casual Play by Play format (basically just Casey and I having a chat and sharing some screen content) so it's easy watching.

IT 51

New Pluralsight Course: Modern Browser Security Reports

Troy Hunt

Rounding out a recent spate of new Pluralsight courses is one final one: Modern Browser Security Reports. You may remember Scott from such previous projects as securityheaders.io , Report URI and, as it relates to this course, our collective cleaning up at a couple of recent UK awards nights: With @Scott_Helme (at a different awards night) learning we both just scored at the European Cyber Security Blogger Awards!

New Pluralsight Course: Emerging Threats in IoT

Troy Hunt

It's another Pluralsight course! It's another "Play by Play" course which means it's Lars and I sitting there having a conversation like this: We choose to talk about IoT because frankly, it's fascinating. And of course, they're just a tiny snippet of the broader set of things we're seeing go wrong with IoT. These Play by Play courses are easy watching.

IoT 60

New Pluralsight Course: Modern Web Security Patterns

Troy Hunt

Whilst this blog post is about a Pluralsight course I created with Lars Klint , it only really hit me during that bank conversation just how much there is to take onboard when it comes to securing things in the browser today. There were so many edge cases and angles not just to the security controls the folks at the bank had heard of before, but of course all those others that were entirely new to them.

IT 54

New Pluralsight Course: Bug Bounties for Companies

Troy Hunt

That's oversimplifying things, of course, but to me that's always been a cornerstone of why bug bounties make so much sense: they change the ROI of bugs such that it incentivises people of all ethical positions to disclose them to the organisation involved rather than run amuck with them. Which brings me to this: I'm sitting with Casey Ellis in a studio in San Franciso recording a Pluralsight course per the title of this blog post.

First Museum Studies courses receive CILIP accreditation


First Museum Studies courses receive CILIP accreditation.

New Pluralsight Course: Adapting to the New Normal: Embracing a Security Culture of Continual Change

Troy Hunt

Which, of course, also means you can't tell people to look for the company name in the address bar either! Best of all, we've made this series easily accessible to everyone: This course and the entire Security Culture series is still 100% free!

First Digital Health Systems courses to receive CILIP accreditation


First Digital Health Systems courses to receive CILIP accreditation. CILIP announces that Digital Health Systems Masters and Postgraduate Diploma courses at University of Strathclyde have become the first of their kind to receive CILIP accreditation.">.

After Whistle-Blower, House Democrats Chart a Course for Trump's Impeachment

WIRED Threat Level

An eventful week on Capitol Hill is only the beginning of a very long road. Security Security / National Security

Progress your career with an ISO 27001 Lead Implementer course

IT Governance

However, information security is a complex, multidisciplinary field, and knowing which course is right for you can be tricky. If you’re interested in gaining that qualification, you should enrol on our ISO27001 Certified ISMS Lead Implementer course.

New course dates for GDPR training in Edinburgh and Glasgow

IT Governance

We run two different GDPR training courses across the UK, providing employees with an introduction to the Regulation and the knowledge required to manage a GDPR compliance project. High demand means we’ve added new course dates in Edinburgh and added Glasgow courses to our schedule.


New Pluralsight Course: Care and Maintenance of Development VMs

Troy Hunt

Regular readers will know I create a lot of Pluralsight courses. It's now 5 years ago I started writing my first one which incidentally, is still my highest rated course every month (apparently the OWASP Top 10 as it relates to ASP.NET is still a big thing). Most of the time, the courses I create are on topics I know well, primarily on security but occasionally with a bit of cloud and development practices sprinkled in for variety.

Cloud 57

New Pluralsight Course: JavaScript Security Play by Play

Troy Hunt

So that's the course in a nutshell, "Play by Play: JavaScript Security" is now live! BTW - fun fact: Aaron was responsible for introducing me to the folks at Pluralsight back in 2012 which ultimately led to many courses and my independence from corporate life and indeed, life as I know it today. Ah JavaScript, the answer to - and cause of - all our problems on the web today! Just kidding, jQuery has solved all our JS problems now.

A Certified Ethical Hacking Course with a difference

IT Governance

Michael Stout, our course trainer, has led CEH courses for more than ten years, and has worked for all the major training centres in the UK and Western Europe. He was the first CEH trainer on the continent and helped roll out training courses in a number of European markets.

First Cyber Defence & Information Assurance courses to receive CILIP accreditation


First Cyber Defence & Information Assurance courses to receive CILIP accreditation. CILIP is delighted to announce that Cyber Defence & Information Assurance Masters and Postgraduate Diploma courses at Cranfield University have become the first of their kind to receive CILIP accreditation, recognising their solid preparation for professional practice and a suitable base for anybody entering the information sector.

CILIP accredits new undergraduate course in Wales


CILIP accredits new undergraduate course in Wales. CILIP is delighted to announce that the BA (Hons) Library and Information Management undergraduate course at Coleg Llandrillo has been awarded CILIP accreditation following the institution?s We are delighted to welcome a new undergraduate course to the range of accredited programmes available.

Simple Security Flaws Could Steer Ships Off Course


A PoC shows how ships could be hacked and fooled into changing direction - all due to simple security issues. Hacks Vulnerabilities admin credentials CVE-2016-9361 hack operational technology Proof of Concept ship attack shipping

How an ISO 27001 Foundation course can help build your career path

IT Governance

The ISO 27001 Certified ISMS Foundation Training Course is the starting point for all prospective ISO 27001 project managers and auditors, or anyone who wishes to build a career in information security management. Book a course today to build you career path >> ISO 27001

How an Online Project Management Training Course Really Works


Are you wondering how an online project management training course really works? Deciding whether or not to enter online courses requires that you take into consideration the processes used within online training courses, and.


Three Decades On: RSA Labs Sets Course for Future

The Security Ledger

RSA Chief Technology Officer and head of RSA Labs Zulfikar Ramzan says his company, which pioneered commercial applications of public key cryptography, is setting its sites on the future as it looks to embrace the disruptive security solutions of the future.

IoT 52

Records Management Training – Upcoming Courses – March, April, May, 2018

National Archives Records Express

We offer a Certificate of Federal Records Management Training to individuals who successfully complete Knowledge Area courses 2-6 and pass exams associated with each course. Upon completion of the courses and exams, participants will receive a certificate signed by the Archivist of the United States. Online courses.

New Pluralsight Course: Defending Against JavaScript Keylogger Attacks on Payment Card Information

Troy Hunt

Only a few weeks ago, I wrote about a new GDPR course with John Elliott. We've been getting fantastic feedback on that course and I love the way John has been able to explain GDPR in a way that's actually practical and makes sense! When we recorded that course in London a couple of months back, we also recorded another one on Defending Against JavaScript Keylogger Attacks on Payment Card Information.

New Pluralsight Course: The State of GDPR - Common Questions and Misperceptions

Troy Hunt

Which brings me to the new course and I put precisely this question to John Elliott whilst in London last month, only a couple of weeks after GDPR had hit. I've known John for a while via Pluralsight channels and we recorded 2 courses together that day, this one and another I'll announce after it goes live. Of course, we also talk about penalties too and what levels will likely apply in what cases, plus how they'll be enforced in jurisdictions outside the EU too.


What Will You Learn in Electrical Project Management Training Courses?


There are various subfields and industries touched by project management, including electrical estimating, which is one of the more prosperous fields that is more specialized than others. A lot of.


New Pluralsight Course: The Role of Shadow IT and How to Bring it out of the Darkness

Troy Hunt

It's a new Pluralsight course! Yes, I know I said that yesterday too , but this is a new new Pluralsight course and it's the second part in our series on Creating a Security-centric Culture. As I wrote there back in Jan, we're doing this course on a quarterly basis and putting it out in front of the paywall so in other words, it's free! This course looks at how shadow IT is changing, what it means in a cloud era and what practices we can apply to address it.

Of course Facebook and Google want to ‘solve’ social problems. They’re hungry for our data | Nathalie Olah

The Guardian Data Protection

Giving big tech companies power over the NHS or the climate crisis won’t build a fairer world. But public ownership would We hear it said all the time, most recently in a national campaign for BT: “Technology will save us.” The slogan was plastered on billboards across the country as part of BT’s new advertising campaign, linked to a “UK-wide digital skills movement” developed partly with Google. The sentiment is so ubiquitous that it even led to a dispute with a startup of a similar name.

Workplace Trends: Age Is but a Number


Employees also agreed that online, self-paced courses were their least favorite, breaking the common stereotype that millennials have no social skills and never look up from their devices. There are researchers who spend their days studying generations.

Of Course Apple Is Going to Do Search.

John Battelle's Searchblog

Yep, it was search, and the signal was the link, interpreted, of course, through PageRank and ultimately hundreds of other sub signals (click through, freshness, decay, etc.). you just have to rethink what "search" really means. Last night Jobs said he had no interest in search. I am quite certain what he meant is he has no interest in HTML, "traditional" search. But think about what search really is, and I am certain, Apple will be in the search business.