Technical Compliance - Enterprise Security beyond silos, gimmicks and paper-shields
|
|
0
|
25
|
September 3, 2020
|
Access as a process - purpose-based Access - Zero Trust for the rest of us
|
|
0
|
462
|
November 20, 2019
|
Corelan Win32 Advanced Exploit Development class at BruCon 2019 - the story with 6 months of homework
|
|
0
|
1831
|
October 6, 2019
|
Small security improvements - zero trust, zero budget, zero time, countless risks
|
|
0
|
701
|
May 18, 2019
|
The Cynefin framework to overlay formative security management approaches
|
|
0
|
788
|
July 11, 2018
|
Information Security Terminology and IT Security - Glossary
|
|
0
|
1685
|
September 25, 2017
|
GDPR FAQs - from DPIA (Article 25) to Data Mapping (Article 30, 32)
|
|
0
|
1284
|
September 7, 2017
|
Use FreeTDS on Linux and Python for Lansweeper Asset Management queries
|
|
0
|
1984
|
April 5, 2017
|
The role of risk assessments and evaluation of evidence in Incident Response
|
|
0
|
1368
|
February 26, 2017
|
Network Intrusion Detection System workflows for Suricata - beyond packets
|
|
0
|
8649
|
January 31, 2017
|
Indicators of failure for information security projects
|
|
0
|
1070
|
May 18, 2016
|