Cybersecurity

182

Solutions

13

Articles & Videos

487

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Refine results

Hi, recently we have seen actual attempts at outside sources trying to use remote desktop to access our network and they had used one of our internal user accounts which they somehow managed to gain a…

2022 views
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Password security

Never store passwords in plain text or just their hash: it seems a no-brainier, but there are still plenty of people doing that. I present the why and how on this subject, offering my own real life solution that you can implement right away, bringing your solution beyond military grade security.

0137 views

Greetings to you.  As a business that accepts credit cards we have to get scanned by Control Scan for our PCI DSS compliance.  

We are currently failing compliance, but I am not sure how to resolve…

218 views

http://arstechnica.com/security/2016/11/powerful-backdoorrootkit-found-preinstalled-on-3-million-android-phones/

We have BYOD in our environment and around 10% Android devices. We use GOOD for secu…

882 views

Hi

In relation to this article here; http://www.telegraph.co.uk/technology/2016/11/16/cheap-android-phones-send-owners-text-messages-and-location-data/

Although the article says Blu devices are …

567 views

Hi,

The SEP client version in use is 12.1.7004.6500.

We would like to use ADC function embedded to implement application whitelisting.

The fingerprints for all authorized program at one mach…

343 views

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.

0206 views

When scanning various banks online sites from https://www.ssllabs.com/ssltest/  ,
the result indicates they are still using TLSv1.0  (besides 1.1 & 1.2) :

https://internet-banking.dbs.com.sg/IB/We…

559 views

Q1
As governance/compliance person, I'm often not being updated by network teams when
new VLANs / subnets are being created.  Network diagram may not be updated timely too.
What are the surest ways…

536 views

People,

Can anyone here please assist me in how to identify my existing SSL certificates which is using SHA-2 or not ?

I need to know if my existing SSL certificate is SHA-2 or not due to POODLE…

1579 views
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Hi All,

i am looking to get more skills and even to a Master in Cyber Security.

Which course you would recommend so i could also use it on my Masters in Cyber Security degree?

963 views

Refer to attached article.

Besides reading the product manual, is there any way I can verify if my
products has Blowfish enabled & if TwoFish is supported?

Some of encryption tools we use are C…

560 views

Hi Experts,

many files on shares are changed to .odin
can you help me out ?
What is the best way to restore or clean all machines ?

561 views

Could someone please describe Android security model by explaining how it is enforced by Linux kernel and at the application layer?

372 views

Hello,

I am with an organization that is starting on the PCI project. We have 3 sites geographically separated that are connected via point to point connections. Only the main site stores the card …

264 views

We have hundreds of public facing web pages : do we protect all of them or only those

a) that when defaced will cause our corporate image to be affected?
b) or web pages that have injection & cert…

764 views

Dear Experts.

I am tasked to secure the site for one company and to prove that I did a good job.
I feel I need a small push to get started with ZAP.

Getting started with ZAP seems very obscure.…

376 views

Can anyone confirm that a user must have "take ownership" permission on a network share in order for ransomware to encrypt the files?

453 views
Superb Internet Corp - SSL Certificates

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant.
Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like a customer’s personal and credit card information.

0165 views
Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Part of my domain's WHOIS info shows the following:

Tech Name: Hostmaster, TABNet
Tech Organization:
Tech Street: 5 Financial Plaza
Tech City: Napa
Tech State/Province: CA
Tech Postal Code: 9…

760 views

We have a client who is interested in the most secure mobile phone for communication of email, voice and sms. Also, their employees use Gmail and other consumer apps on their phones and if a way these…

772 views

We have a BYOD estate that's fairly large, approx 3000 devices, mainly iOS.

We enforce a minimum iOS version of 8 via our MAM software. That is, of the user isn't running iOS 8 or above, the corpor…

269 views

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY.
How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...

0441 views

Is there some sort of apps or tools or study that is being used out there for monitoring social networks? A week ago in one of our meeting that topic came up and we were left with the mouth open that …

1296 views

Looking for some recommendations on Email Gateways.  Hoping to catch the attention and get ideas from Exchange Admins, Cyber Security Professionals, folks who work the security field, email is a big o…

477 views
Show more content
201506-LO-Top-001

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Security
    (22,945)
  2. Network Security
    (6,158)
  3. Vulnerabilities
    (6,587)
  4. OS Security
    (21,449)
  5. Encryption
    (6,860)
  6. Anti-Virus Apps
    (22,108)
  7. Networking
    (89,128)
  8. Delphi
    (58,957)
  9. Visual Basic Classic
    (163,567)
  10. Software Firewalls
    (19,704)