Home > Blogs > Security

Blog Posts about Security

RSS Feed Subscribe  RSS details

Risk Management Versus Vulnerability Analysis

John  Traenkenschuh

Vulnerability Analysis is deceptively easy. Security Red Teaming requires more than that.

Continue reading...

How the Internet Works: The Deep Web

Brad Yale

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Continue reading...

How the Internet Works: A Call for Personal Security

Brad Yale

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

Continue reading...

Mobile Malware and Fake Apps: Hong Kong, China and The New York Times

Brad Yale

For the past week or so, Hong Kong has erupted with peaceful demonstrations advocating for the ousting of the Chinese premiere and the right to peacefully and openly elect his replacement. While the Chinese premiere, Xi Jinping, looks to be going nowhere one thing has become clear - the mobile devices and Internet connections which helped to grow the nightly demonstrations are quietly suffering an inward meta problem - malware, viruses and fake applications.

As mobile platforms become more prominent and are used more robustly to organize, carry out financial transactions and conduct daily personal business, the time has come to address mobile malware and fake applications.

Continue reading...

InformIT Labor Day Programming Event

Brad Yale

Welcome to the InformIT Labor Day Event.

From August 28th - September 3rd,  the following deals apply to all ebooks, books, video learning lessons, interactive learning lessons, software and practice tests:

- Purchase three or more titles. Save 55%. 

- Purchase two titles. Save 45%. 

- Purchase one title. Save 35%.

**Free Shipping to all locations in the United States*

*30 Day Trial to Safari Books Online**

Coupon code (Case Sensitive):  LABORDAY

Continue reading...

The Best Browser Extensions

Brad Yale

We spend a lot of time online. According to a recent Mashable article posted by Matt Petronzio on March 5, 2014, the average American adult spends 11 hours per day with electronic media. Of that, three hours is spent on social media, nearly one hour is spent on a smartphone and nearly one hour is spent on the Internet via a PC. Taken as a whole, the average American adult spends between 2 – 4 hours online every day.

We spend a lot of time online. To make your daily online life better, below is a list of the five coolest Internet Browser extensions.

Continue reading...

The IT List: What You Missed This Week on InformIT [8/1/14]

Emily Nave

With today's "connected life" running 24/7, we recognize it's hard to keep up with all your favorite websites and tech resources. The IT List is here to help you cut through the noise. Check back each Friday for a quick digest of articles, resources, promotions, and other goodies worth a first or second look on InformIT.

Continue reading...

How Long?

John  Traenkenschuh

Traenk kept his Windows system from the Internet, from even starting, for some 45 days.  A lot can de-evolve in 45 days...  Honestly, how long does it take before your system becomes very vulnerable and how long must we wait for new Windows components?  Will Windows 9 fix the issues?

Continue reading...

Ethical Hacker

John  Traenkenschuh

It's time to take back the term hacker from the wanna-be's...

Continue reading...

The IT List: What You Missed This Week on InformIT [7/25/14]

Emily Nave

With today's "connected life" running 24/7, we recognize it's hard to keep up with all your favorite websites and tech resources. The IT List is here to help you cut through the noise. Check back each Friday for a quick digest of articles, resources, promotions, and other goodies worth a first or second look on InformIT.

Continue reading...

The IT List: What You Missed This Week on InformIT [7/11/14]

Emily Nave

With today's "connected life" running 24/7, we recognize it's hard to keep up with all your favorite websites and tech resources. The IT List is here to help you cut through the noise. Check back each Friday for a quick digest of articles, resources, promotions, and other goodies worth a first or second look on InformIT.

Continue reading...

The IT List: What You Missed This Week on InformIT [6/27/14]

Emily Nave

With today's "connected life" running 24/7, we recognize it's hard to keep up with all your favorite websites and tech resources. The IT List is here to help you cut through the noise. Check back each Friday for a quick digest of articles, resources, promotions, and other goodies worth a first or second look on InformIT. 

Continue reading...

Page 1 2 3 4 5 Next >