Linked e-resources
Details
Table of Contents
Are you ready for Quantum computing?
The need for post-quantum cryptography
Quantum Encryption is not a Paradox
AI Code of Ethics for Cybersecurity
The Case of AI/ML in Cybersecurity
Security for Work-From-Home Technologies
Secure video conferencing and online collaboration
If you must work from home, do it securely!
Security Controls for Remote Access Technologies
Specialty Malware and backdoors for VDI
The Future State of Data Security
Cybersecurity enabled by Zero Trust
Advanced Active Directory attacks and Prevention
Cyber Deception Systems
Hypervisor Introspection
Bitcoin is a decade old, and so are the threats to the various blockchain ecosystems
The advanced malware prevention playbook
The 768K Precipice
MAC Address Randomization to limit user/device tracking
Transport Layer Security 1.3
The use of ESNI with TLS 1.3, is it a boon to privacy? Or does it raise security concerns
Using FQDN vs IP addresses in FW rules and app configs
Network Time Protocol (NTP) Security
Domain Name System (DNS) Security
Next Gen Wi-Fi and Security
The next frontier for CA/Certificate security
DANE and Certificate Transparency
Man-in-the-middle Attack Prevention
Distributed Denial of Service (DDoS) Prevention
Intro to API Security's Issues and Some Solutions!
Windows subsystem for Linux
security risk and mitigation
Common sense security measures for voice activated assistant devices
The case for code signing and dynamic white-listing
Biometrics
Commentary on data breach notification, threats, and data security
Security requirements for RPA Bots
Polymorphic and Metamorphic Malware
Introduction to Cloud Monitoring Security Controls
Cloud Monitoring Security Controls for AWS
Cloud Monitoring Security Controls for Azure
Cloud Policy Enforcement Point
Dynamic measurement of cyber risk
OEM and third-party sourced application and services risk
Commentary on Insider Threat
Simplified approach to calculate the probability of a cyber event
Privacy concerns from publicly available meta-data
Dark Web & Dark Net
Risk-Based Vulnerability Management.
The need for post-quantum cryptography
Quantum Encryption is not a Paradox
AI Code of Ethics for Cybersecurity
The Case of AI/ML in Cybersecurity
Security for Work-From-Home Technologies
Secure video conferencing and online collaboration
If you must work from home, do it securely!
Security Controls for Remote Access Technologies
Specialty Malware and backdoors for VDI
The Future State of Data Security
Cybersecurity enabled by Zero Trust
Advanced Active Directory attacks and Prevention
Cyber Deception Systems
Hypervisor Introspection
Bitcoin is a decade old, and so are the threats to the various blockchain ecosystems
The advanced malware prevention playbook
The 768K Precipice
MAC Address Randomization to limit user/device tracking
Transport Layer Security 1.3
The use of ESNI with TLS 1.3, is it a boon to privacy? Or does it raise security concerns
Using FQDN vs IP addresses in FW rules and app configs
Network Time Protocol (NTP) Security
Domain Name System (DNS) Security
Next Gen Wi-Fi and Security
The next frontier for CA/Certificate security
DANE and Certificate Transparency
Man-in-the-middle Attack Prevention
Distributed Denial of Service (DDoS) Prevention
Intro to API Security's Issues and Some Solutions!
Windows subsystem for Linux
security risk and mitigation
Common sense security measures for voice activated assistant devices
The case for code signing and dynamic white-listing
Biometrics
Commentary on data breach notification, threats, and data security
Security requirements for RPA Bots
Polymorphic and Metamorphic Malware
Introduction to Cloud Monitoring Security Controls
Cloud Monitoring Security Controls for AWS
Cloud Monitoring Security Controls for Azure
Cloud Policy Enforcement Point
Dynamic measurement of cyber risk
OEM and third-party sourced application and services risk
Commentary on Insider Threat
Simplified approach to calculate the probability of a cyber event
Privacy concerns from publicly available meta-data
Dark Web & Dark Net
Risk-Based Vulnerability Management.