I saw this post by Prabnair1 on Reddit, and just had to share it with my CISSP students.
- P – Policy & Strategy Level
- R – Risk-Based Decisions
- O – ...
OCT
I saw this post by Prabnair1 on Reddit, and just had to share it with my CISSP students.
[2024.08.15] From the Federal Register:
After three rounds of evaluation and analysis, NIST selected four algorithms it will standardize as a result of the PQC Standardization Process. The public-key ...
Continue Reading →APIs (Application Programming Interfaces) are pivotal in modern software development, facilitating communication between different systems and applications. However, as APIs become more integral to business operations, securing them has become increasingly critical. Ensuring API security involves protecting the API from malicious attacks, unauthorized access, and ensuring the integrity and confidentiality of the data being exchanged.
Understanding API Security Threats
Scroll down to bottom of the event page
Starting in 2020, our profession had to deal with issues from the pandemic, and we faced business closures, ...
Continue Reading →Posted on Linked in and Reddit
“Think like a manager” – a phrase synonymous with the CISSP
For those who come from a technical background, cultivating the appropriate mindset is crucial when tackling the CISSP. Answering the exam questions solely from a technical standpoint, delving too ...
Continue Reading →When I am teaching about risk assessment, we eventually get to a couple of different ways to calculate risk.
The first formula is: Risk = Threat x Vulnerability x Likelihood. This is a probabilistic.. This approach that looks at how likely a certainly risk is to occur.
The second formula is : Risk = ...
Continue Reading →I have just finished teaching a couple of CompTIA Network+ classes. One of the subject matter areas that most students struggle with is the concepts around Subnetting, Supernetting, Variable Length Subnet Masking (VSLM), Fixed Length Subnet Masking (FLSM), Classless Interdomain Routing (CIDR),
I recently found this collection of ten videos presented by
Continue Reading →In late 2022, Mandiant responded to a disruptive cyber physical incident in which the Russia-linked threat actor Sandworm targeted a Ukrainian critical infrastructure organization. This incident was ...
Continue Reading →Learn technical details about this newly disclosed security vulnerability, as well as mitigation recommendations from the Google researcher who discovered it.
Here is a great side by side comparison of IPv4 and IPv6. This is a handy guide for anyone taking A+ or Network+, or another networking certification such as the CCNA or CCNP.
From Rick Petrucci on Pinterest