Remove Course Remove Demo Remove Security Remove Video
article thumbnail

Weekly Update 390

Troy Hunt

I'm reminded of the old "fast, good and cheap - pick 2" saying, but there's a lot more nuance to it than that, of course. References Sponsored by: Kolide ensures that if a device isn't secure, it can't access your apps. Watch the demo today! Or geo-replicate. It's Device Trust for Okta.

Access 81
article thumbnail

New Pluralsight Course: Modern Browser Security Reports

Troy Hunt

Rounding out a recent spate of new Pluralsight courses is one final one: Modern Browser Security Reports. In fact, we recorded this course in London only a few days after that pic was taken (although admittedly in a less well-dressed fashion). One of my favourite to demo is XSS auditor reporting.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. As someone who’s helped thousands of security professionals learn how to analyze malware at SANS Institute , I have a few tips for how you can get started.

Metadata 145
article thumbnail

Here's Why Your Static Website Needs HTTPS

Troy Hunt

Even the government has been pushing to drive adoption of HTTPS for all sites, for example in this post by the National Cyber Security Centre in the UK : all websites should use HTTPS, even if they don't include private content, sign-in pages, or credit card details. — Troy Hunt (@troyhunt) July 5, 2018. WiFi Pineapple.

Risk 110
article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

In several recent posts, I’ve talked about professional development options for information management professionals and provided guidance on how to determine whether a particular course or certification is a good fit. If there is sufficient interest, I may write a few subsequent posts that go into more depth about our courses.

ECM 116
article thumbnail

Free resources to help you prevent and respond to data breaches

IT Governance

The situation might seem hopeless, with cyber criminals outnumbering overworked and underfunded information security personnel, but there are plenty of ways you can improve your defences, even on a tight budget. Videos, blogs and podcasts. Green papers. This green paper explains each requirement and how you can comply.

article thumbnail

Guest Blog: TalkingTrust. What’s driving the security of IoT?

Thales Cloud Protection & Licensing

What’s driving the security of IoT? The Urgency for Security in a Connected World. It’s also enabling manufacturers to respond faster to security vulnerabilities, market demand, and even natural disasters. Device Security is Hard. For all the benefits of connectivity, there are, of course, challenges.

IoT 77