I'm working with Barclays PLC on a UK FinTech competition. This gives you a chance to get virtual coaching from me and to possibly win a share of £5,000.Barclays PLC has established itself at the forefront of development in financial technology (FinTech).
SABSA stands for the Sherwood Applied Business Security Architecture, and is a leading methodology for developing business operational risk and opportunity-based architectures. It provides a framework for developing risk driven enterprise information security
I recommend this tool if you want to check if your Windows machines are susceptible to the Spectre and Meltdown vulnerabilities. Bonus - It also checks the performance hit too of any applied fixes!“InSpectre” is an easy to use & understand utility
For the first time, we’re about to see in place a Europe-wide regime governing critical infrastructure cybersecurity. Here’s what you need to know about the Network and Information Security (NIS) Directive …The NIS Directive - what’s it all about?Affecting the
In reference to Windows security updates released January 3, 2018, and antivirus software.Microsoft customers will not receive the January 2018 security updates (or any subsequent security updates) and will not be protected from security vulnerabilities
To tell or not to tell? That’s the dilemma faced by anyone who’s been hit by hackers or online fraudsters. We look at the reasons why so many businesses opt to stay quiet. And with GDPR around the corner, we also discover why keeping schtum about the loss of
Billed as “immunisation for your computer”, Quad9, a new DNS service, promises to enable much safer Web browsing, enhance your privacy while preserving performance. On top of all this, it’s free to use. So is there a catch? We take a look…Quad9: what are we
It is imperative to stay up-to-date with the latest security news, threats, and vulnerabilities. Failing to stay up-to-date puts you at risk. Everyday you need to stay alert to the changing threat landscape so that you can react appropriately.At Station X
I frequently get asked what hacking resources I recommend. So here is my list of must reads books and must watch courses.Hacking CoursesThe Complete Ethical Hacking Course Bundle (90% off Coupon)https://www.stationx.net/hack90The Complete Nmap Ethical
The Tor project are releasing the next generation of onion services! They have been working on this new project for the past 4 years and officially launched it two weeks ago by publishing their first alpha releases.Also know as Proposal 224.This newer
http://icyberchef.com/WhatA simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages. CyberChef encourages both technical and non-technical people to explore data formats, encryption and
In tech terms, 1990 seems like ancient history. So why do you need to know about an Act of Parliament that’s older even than the first ever web browser?Here’s the reason: if you find yourself on the wrong end of the law for any one of an extremely wide range
Here is my video breakdown on Key Reinstallation Attacks (KRaCKs) - Breaking WPA2 by forcing nonce reuse.Here is my video breakdown on Key Reinstallation Attacks (KRaCKs) - Breaking WPA2 by forcing nonce reuse.
Transcript of Video...Background; The Department of Homeland Security (DHS) issued a directive, first reported by the Washington Post, calling on departments and agencies to identify any use of Kaspersky antivirus software and develop plans to