#informationsecurityUnmoderated tagAll postsTrending CommunitiesNewcomers' CommunitySteemitCryptoAcademySteemit Feedbackআমার বাংলা ব্লগKorea • 한국 • KR • KOSTEEM CN/中文Steem AllianceWORLD OF XPILARAVLE 일상Comunidad LatinaSteem POD TeamBeauty of CreativityExplore Communities...#informationsecurityTrendingHotNewPayoutsMutedroshannrs (26)in #iso27001certification • last monthHow the ISO 27001 standard helps to prevent data breach?Cybersecurity is a growing concern for businesses worldwide. The ISO 27001 standard provides a robust framework for…roshannrs (26)in #niststandardhistory • 2 months agoHistory of NIST Standard and why it should be implementedNIST Standard History: A Guide to Cybersecurity Excellence – Discover how these standards have shaped information…roshannrs (26)in #iso27001certification • 2 months agoHow can ISO 27001 Certification Service Strengthen Your ISMSUncover the transformative power of ISO 27001 certification service. This blog explains how it enhances your ISMS…cybercourses (28)in #cciso • 3 months agoA Comprehensive Guide to the Certified Chief Information Security Officer (CCISO) CertificationIn today’s fast-evolving digital landscape, cybersecurity threats are escalating at an unprecedented rate.…cybercourses (28)in #eccu • 10 months agoExecutive Leadership in Information Assurance (MSCS) | EC-Council UniversityIn an era where digital threats are ever-evolving and the stakes for information security are higher than ever, the…anguslam (25)in #cybersecurity • 2 years ago网络安全:保护个人信息的必要性随着互联网的普及和发展,网络安全问题越来越受到人们的关注。每天都有大量的个人信息在互联网上传输,如何保护这些信息已经成为一个紧迫的问题。在这篇专栏中,我将探讨网络安全的重要性以及如何保护个人信息。…tutorialboy (29)in #cybersecurity • 2 years agoWhat is Web Fuzzing: How can Web Fuzzing useful in Pentest?Fuzzing is generally finding bugs/issues using automated scanning with supplying unexpected data into an application…tutorialboy (29)in #php • 3 years agoHow To Exploit PHP Remotely To Bypass Filters & WAF RulesThis is the first of two vulnerable PHP scripts that I’m going to use for all tests. This script is definitely too…strongboxit (25)in #strongboxit • 3 years agoWHAT IS GDPR?General data protection regulation (GDPR) is a law enacted by the European Union (EU) to dictate the transfer of…strongboxit (25)in #security • 3 years agoRequirements for GDPR complianceKey privacy and data protection requirements for GDPR compliance ✔️Requiring the consent of subjects for data…strongboxit (25)in #security • 3 years agoGoals of NISTThe goals of NIST are threefold. To provide a comprehensive and flexible catalogue of controls for current and…strongboxit (25)in #strongboxit • 3 years agoWhat is NIST?NIST SP 800-53 NIST( National Institute of Standards and Technology) SP 800-53 is a set of metrics and guidelines…strongboxit (25)in #security • 3 years agoWhat is FISMA?Federal Information Security Management Act, FISMA, drafts the guidelines for federal organizations to develop…strongboxit (25)in #strongboxit • 3 years agoCase Study 3: Mass EngagementObjective Harden the systems to avoid exploits of zero-day attacks. To increase the monitoring of systems handling…strongboxit (25)in #security • 3 years agoInformation security lifecycleInformation security lifecycle is a methodology that ensures a continuous, progressive and evolutionary journey within…rescueranjazz (36)in #datadestruction • 3 years agoHappy Holidays from Horizon Alliance Technologies LLCHorizon Alliance Technologies is developing irreversible data destruction techniques to help digital natives and…gurukol (26)in #cybersecurity • 3 years agoCyber Security | GurukolIt's 2021, Let's get to learn about Cyber Security. Gurukol!dj-sa (25)in #strategy • 4 years agoTop Strategy Targets The HeartsIn criminology, there are three elements — motives, opportunities and means. To disrupt bad things, removing any…anthonyadavisii (70)in #esteem • 5 years agoEncrYPtIOn is fUtIlE - Debunking the Cult of John McAfeeJohn McAfee is one of the more bombastic and eccentric personalities in the crypto space. Besides making a wager…verhp11 (67)in #blog • 5 years agoA victim of phishing, stupidity of sophisticated?Source The message above is about an IT person who has become a victim of phishing himself. Of course I don't know…