spylogic.net
Top 5 Attack Vectors Report: Defend It Before You Hack It — spylogic.net
http://www.spylogic.net/2014/07/2014-top-5-attack-vectors-report-defend-hack
Teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13. Top 5 Attack Vectors Report: Defend It Before You Hack It. July 30, 2014 – 5:24 pm. Missing Patches and System Misconfigurations. The full report is available for download on the SecureState website. I also presented a webinar ( watch the replay here. What’s the bottom line? Build and test your defensive controls first, then test to see how these controls hold up. Most of these controls are a mix of tactical...
spylogic.net
Currently browsing SANS posts — spylogic.net
http://www.spylogic.net/tag/sans
Teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13. June 7, 2013 – 12:07 pm. Filed under Application Security. Just a quick update to let everyone know that I’ll be teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13th. Check out the SANS class information page for more information about the class, agenda and location. Save 10% on your registration using code: TomStLouis. See you in St. Louis! March 8, 2013 – 3:18 pm.
spylogic.net
Currently browsing SEC542 posts — spylogic.net
http://www.spylogic.net/tag/sec542
Teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13. June 7, 2013 – 12:07 pm. Filed under Application Security. Just a quick update to let everyone know that I’ll be teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13th. Check out the SANS class information page for more information about the class, agenda and location. Save 10% on your registration using code: TomStLouis. See you in St. Louis! June 21, 2012 – 2:26 pm.
bloggingenglish1.blogspot.com
Blogging English: Phishing
http://bloggingenglish1.blogspot.com/2009/05/internet-risk-definitions.html
Monday, May 11, 2009. Is an online fraud that, unfortunately, is becoming more and more common. It consists in the attempting to obtain personal details and sensitive information, such as usernames, passwords, credit card numbers or pins numbers and secret codes, in general. The technique of phishing is based on the. Mass sending of fake e-mails. Using phishing filters, don't clicking on suspicious links or attached files are some simple tricks to not fall victim to phishing. How to secure your computer.
spylogic.net
Currently browsing passwords posts — spylogic.net
http://www.spylogic.net/tag/passwords
Top 5 Attack Vectors Report: Defend It Before You Hack It. July 30, 2014 – 5:24 pm. Missing Patches and System Misconfigurations. The full report is available for download on the SecureState website. I also presented a webinar ( watch the replay here. What’s the bottom line? Build and test your defensive controls first, then test to see how these controls hold up. Most of these controls are a mix of tactical and strategic, but reactively focused. By taking a proactive stance on defense, your orga...The e...
spylogic.net
Currently browsing Application Security posts — spylogic.net
http://www.spylogic.net/category/application-security
Category Archives: Application Security. Teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13. June 7, 2013 – 12:07 pm. Filed under Application Security. Just a quick update to let everyone know that I’ll be teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13th. Check out the SANS class information page for more information about the class, agenda and location. Save 10% on your registration using code: TomStLouis. Running th...
spylogic.net
Currently browsing report posts — spylogic.net
http://www.spylogic.net/tag/report
Top 5 Attack Vectors Report: Defend It Before You Hack It. July 30, 2014 – 5:24 pm. Missing Patches and System Misconfigurations. The full report is available for download on the SecureState website. I also presented a webinar ( watch the replay here. What’s the bottom line? Build and test your defensive controls first, then test to see how these controls hold up. Most of these controls are a mix of tactical and strategic, but reactively focused. By taking a proactive stance on defense, your orga...This ...
spylogic.net
Presenting at SANS 2013 in Orlando Next Week — spylogic.net
http://www.spylogic.net/2013/03/presenting-at-sans-2013-in-orlando-next-week
Laquo; Teaching SANS SEC542: Web App Penetration Testing and Ethical Hacking in St. Louis July 8-13. Project Mayhem to be Unleashed at Black Hat Abu Dhabi. Presenting at SANS 2013 in Orlando Next Week. March 8, 2013 – 3:18 pm. I’ll be at SANS 2013 in Orlando. This weekend assisting Kevin Johnson. With his SEC542: Web App Penetration Testing and Ethical Hacking class. And giving two SANS@Night presentations:. Social Zombies: Rise of the Mobile Dead w/Kevin Johnson. Click here to cancel reply. HTTP/1.0...
spylogic.net
Currently browsing Conferences posts — spylogic.net
http://www.spylogic.net/category/conferences
Presenting at SANS 2013 in Orlando Next Week. March 8, 2013 – 3:18 pm. I’ll be at SANS 2013 in Orlando. This weekend assisting Kevin Johnson. With his SEC542: Web App Penetration Testing and Ethical Hacking class. And giving two SANS@Night presentations:. Social Zombies: Rise of the Mobile Dead w/Kevin Johnson. 8211; Monday, March 11th, 7:15pm – 8:15pm. 8220;Hall of Shame” Apps in the Apple App Store and Google Play. 8211; Wednesday, March 13th, 8:15pm – 9:15pm. May 12, 2012 – 11:01 am. I often wonder wh...