Quantcast
Channel: Featured | SecurityOrb.com
Browsing all 67 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

DerbyCon Presentation – Security Vulnerability Assessments Process and Best...

Conducting regular security assessments on the organizational network and computer systems has become a vital part of protecting information-computing assets. Security assessments are a proactive and...

View Article



Image may be NSFW.
Clik here to view.

An Interview with Armitage and Cobalt Strike developer Raphael Mudge

  On November 14, 2012, I had the opportunity to interview Raphael Mudge (@armitagehacker) the creator of Armitage and Cobalt Strike and the founder of Strategic Cyber, LLC. Armitage is a free GUI...

View Article

Image may be NSFW.
Clik here to view.

An Interview with Mark Russinovich

This week on Washington DC based “The SecurityOrb Show” a discussion with Mark Russinovich occurred. The discussion centered around his role at Microsoft as a Technical Fellow as well as some of the...

View Article

Image may be NSFW.
Clik here to view.

WordPress and Internet Security with Kellep Charles

Scott talks to Security Consultant Kellep Charles about WordPress and public website security. What can you do to protect yourself? Where does internet security break down? Listen to it here or you can...

View Article

Image may be NSFW.
Clik here to view.

A Discussion with Vivek Ramachandran of SecurityTube.net and Author of...

SecurityOrb.com’s Kellep Charles had a discussion with Vivek Ramachandran about the idea behind the SecurityTube.net website, his book “BackTrack 5 Wireless Penetration Testing” and other interesting...

View Article


Image may be NSFW.
Clik here to view.

Interview with Joseph Muniz Co-Author of Web Penetration Testing with Kali Linux

Joseph Muniz is a technical solutions architect and security researcher. He started his career in software development and later managed networks as a contracted technical resource. Joseph moved into...

View Article

Image may be NSFW.
Clik here to view.

SANS Cyber Defense Initiative (CDI) 2014

SANS Cyber Defense Initiative (CDI) 2014 will once again bring together the nation’s cyber defense community on December 10-19 at the Grand Hyatt Washington in DC.   CDI 2014 is not only a leading...

View Article

Image may be NSFW.
Clik here to view.

Dozens of Chinese Held in Kenya ‘Cyber Bust’ Dozens

At the beginning of the month, the Kenyan Police located 77 Chinese nationals operating a cyber crime network and a command center in the country’s capital, Nairobi. According to police reports, the...

View Article


Image may be NSFW.
Clik here to view.

President Obama at the Cybersecurity Summit

President Obama at the Cybersecurity Summit President Obama talked about cybersecurity and consumer protection. In his remarks he said the U.S. was in a “cyber arms race” and called cyberspace the new...

View Article


Image may be NSFW.
Clik here to view.

A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking” by...

A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking” In June of 2014 No Starch Press published “Penetration Testing: A Hands-On Introduction to Hacking” by security trainer and...

View Article

Image may be NSFW.
Clik here to view.

Security vs Privacy: Encryption Technology After the Paris Attack

Security vs Privacy: Encryption Technology After the Paris Attack In the wake of the Paris attack, a healthy discussion about security and privacy has been revisited and the discussion is centered on...

View Article

Image may be NSFW.
Clik here to view.

The SecurityOrb Show – An Interview with Marcus J. Carey Founder of vThreat:...

Listen to what Marcus has to say here: Cyber-attack simulation is the practice of testing an organization’s network security and incident response preparedness on-demand and without exploits to...

View Article

Image may be NSFW.
Clik here to view.

Content Filtering Software List

What is Internet Content Filtering? What if you could block Internet content for your children based on their maturity level? What if you could block porn completely without being forced to use a...

View Article


Image may be NSFW.
Clik here to view.

Encryption Technology and Law Enforcement Technology Testified

Encryption Technology and Law Enforcement Technology and law enforcement officials testified at a hearing on the use of encryption technology. In the law enforcement, witness Amy Hess argued that...

View Article

Image may be NSFW.
Clik here to view.

The Johns Hopkins Foreign Affairs Symposium Presents: The Price of Privacy:...

The Johns Hopkins Foreign Affairs Symposium Presents: The Price of Privacy: Re-Evaluating the NSA ShareThe post The Johns Hopkins Foreign Affairs Symposium Presents: The Price of Privacy: Re-Evaluating...

View Article


WordPress 4.5.2 Security Release

WordPress 4.5.2 Security Release Posted May 6, 2016 by Helen Hou-Sandi on the WordPress Blog Site. WordPress 4.5.2 is now available. This is a security release for all previous versions and we strongly...

View Article

Cyber Security Agenda for the Next President

The Obama administration has implemented a number of cybersecurity and privacy initiatives aimed at making IT more secure for the federal government and the private sector. Those include the...

View Article


Connected Cars: Strategies For Reducing The Ever-Expanding Risk

The best way automakers can keep customers safe and mitigate threats to their own enterprise is to first hack themselves. As automakers improve the driving experience with digital technology, they also...

View Article

Dozens of Chinese Held in Kenya ‘Cyber Bust’ Dozens

At the beginning of the month, the Kenyan Police located 77 Chinese nationals operating a cyber crime network and a command center in the country’s capital, Nairobi. According to police reports, the...

View Article

A Discussion with Vivek Ramachandran of SecurityTube.net and Author of...

SecurityOrb.com's Kellep Charles had a discussion with Vivek Ramachandran about the idea behind the SecurityTube.net website, his book "BackTrack 5 Wireless Penetration Testing" and other interesting...

View Article
Browsing all 67 articles
Browse latest View live




Latest Images