peertube1337
cybercrime
6M
"Russia's Cyber Militia: Investigation and Legal Challenges"
Cybercrime, Investigation, Stroganov Group, Flint, Legal Proceedings, Information Security, Organized Crime, Cybersecurity, Criminal Case, Prosecutor. Title: Tags: #OSINT #criminal_activity #cybercrime
$ 0.000
0
1
aagabriel
cogsec
10M
Tools and Techniques for Cognitive Security
Tools and Techniques for Cognitive Security - a slideshow presentation
$ 14.046
190
3
3
mrosenquist
STEMGeeks
1y
National Cybersecurity Plan Fails to Address Ransomware
The US National Cybersecurity Strategy Implementation Plan fails to address ransomware. There is a real opportunity for the government to make significant progress in crushing the growing scourge of ransomware
$ 2.886
102
4
ruldan20
DBuzz
1y
Taking review of my IT information security upskilling, soon to take my second tim ...
... e security+ certification. #dbuzz #hive #cryptography #infosec
$ 0.020
2
2
scetrov
wax
1y
Using WAX permissions to create a custom Warsaken claim-only keypair
Leverage WAX permissions and link auths to minimise the risk of a lost phone or tablet compromising a WAX account.
$ 0.157
8
3
gray00
hive
2y
[AIGEN] Official OpenAI's GPT4: Warning to All Hive StakeHolders and witnesses. Quantum Blockchain Innovation Stack;Part 2:
Quantum-Resistant Cryptography a. Post-quantum cryptography algorithms Post-quantum cryptography refers to cryptographic algorithms designed to be secure against attacks from both classical and quantum
$ 0.000
1
mrosenquist
STEMGeeks
2y
Crucial conversations: Overcoming the 5 Areas Where CISOs Tend to Struggle
I had a great conversation with Marco Ciappelli and Sean Martin from ITSPmagazine Podcast discussing the mistakes and hard-learned lessons in cybersecurity! They are such characters! A fun and informative
$ 1.842
72
1
doifeellucky
infosec
2y
The Top 5 cyber security breaches of the last 10 year’s
Well folks, it's that time of year again. Time to reflect on the past decade and take a look at the top 5 cybersecurity breaches that had us all on the edge of our seats. And boy, did we have some doozies
$ 2.741
22
3
1
doifeellucky
security
2y
Lastpass hack, a password manager disaster…
Password manager customer data stolen!
$ 4.114
82
4
macchiata
The MINIMALIST
2y
Building Minimalist Productivity Setup
A somewhat minimalist approach to technology Recently, I've been sharing a lot about data and OPSEC (Operation Security). In layman terms, OPSEC basically helps to secure yourself from potential threats.
$ 11.283
520
8
5
Do you care about your data?
Data is the new currency. And if a product is free, you are the product; A phrase coined by a world-famous American sculptor and video artist Richard Serra in 1973. These days, that phrase is everywhere
$ 19.333
388
15
5
lukaz364
Cybersecurity
2y
Cyber security : a necessary tool for modern-day business
Advancement in information and communication technology has adversely affects the operation and process of businesses, education, military etc. These domains now thrive in the cyber space as opposed to
$ 0.000
1
1
mrosenquist1
CyberSecurity
3y
Finding the Next SolarWinds Type of Supply Chain Attack
It is time the industry evolves our collective capability to detect the next SolarWinds type of supply chain attack. The SolarWinds compromise showed that supply-chain attacks are possible and the
$ 0.000
3
mrosenquist1
CyberSecurity
3y
Cybersecurity Insights - Criminalizing Ransomware Payments with Malcolm Harkins
Ransomware is a growing scourge. Is it possible to eradicate this entire class of attacks? I think it is but in today’s Cybersecurity Insights interview I have a lively debate with Malcolm Harkins on
$ 0.000
5
mrosenquist1
CyberSecurity
3y
Cybersecurity Insights - Deficient Forethought for Digital Technology Risks with Alexander Stein
In today’s Cybersecurity Insights podcast, I am talking with Dr. Alexander Stein, an expert in human decision-making and behaviors involving cybersecurity vulnerabilities and the unintended consequences
$ 0.122
29
1
mrosenquist
STEMGeeks
3y
Video Presentation: Why Cybersecurity is Not Fixed Yet
I recently presented to a small group on why cybersecurity is becoming more difficult over time, despite all the money and effort that is being applied. Sharing a replay of the presentation where I discuss
$ 33.433
204
1
mrosenquist1
CyberSecurity
3y
Why Cybersecurity is Not Fixed Yet
I recently presented to a small group on why cybersecurity is becoming more difficult over time, despite all the money and effort that is being applied. Sharing a replay of the presentation where I discuss
$ 0.088
20
1
mrosenquist1
CyberSecurity
3y
They Said a CISO Does What?
The cybersecurity industry had challenges with bringing in new blood and facilitating the career growth. Misinformation has unfortunately played a part in making various roles appear unattainable, when
$ 0.323
32
anthonyadavisii
DBuzz
3y
You think removing wireless radios is enough to protect air-gapped sys ...
You think removing wireless radios is enough to protect air-gapped systems? Think again. #infosec #lantenna #airgap #cybersecurity
$ 0.992
20
4
natebowie
podcast
3y
Various Tech Podcasts I Think You Might Like
A list of technology/information security podcasts I find interesting and you may too. Don't worry, no sponsors/self promo.
$ 0.085
23
Top communities