AI-Driven Threat Detection and Mitigation in Project Scheduling for Secure Software Development

By James Wilson

Software development is a very careful and intricate process that requires planning, execution, and security measures. But the thing is that today’s digital landscape is riddled with cyber threats and challenges in every corner.  

Enter artificial intelligence. By leveraging the power of AI, software development teams can proactively identify and address potential security risks, ensuring the creation of secure and robust software solutions.

In this article, we will explore the capabilities of AI and ...

Continue Reading →
0

URL Encoding, SQL Injection, and Directory Traversal for Cybersecurity Certification – Part 1

Numbering Systems

By Bob Weiss

Many of the cybersecurity certifications that I teach have content that involves the uses of encoding, code injection, directory transversal, and scripting.  These concepts can be difficult to grasp, and the exam questions can be challenging to answer correctly.  This series of articles is designed to help you understand the basic concepts, and how these get used both securely and maliciously.  I am planning to show examples to help you identify these types of use cases or ...

Continue Reading →
2

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


CISA and FBI Release ESXiArgs Ransomware Recovery Guidance

Original release date: February 8, 2023

Today, CISA and the Federal Bureau of Investigation (FBI) released a joint Cybersecurity Advisory, ESXiArgs Ransomware Virtual Machine Recovery Guidance. This advisory describes ...

Continue Reading →
0

SQL Injection

This post is for my cybersecurity students, and anyone else taking a cybersecurity class or studying for a certification exam.

From Jason Dion: “The most common type of code injection is SQL injection. An SQL injection attempts to modify one or more of an SQL query’s four basic functions: select, insert, delete, or update. Two common methods of performing an SQL injection are either using a single apostrophe (‘) or submitting an always true statement like 1=1.  As a penetration tester, you ...

Continue Reading →
0

How to help ensure your project meets its deadline

Managing a project is not for the faint hearted, as there is potentially so much that could go wrong and many things you will need to monitor – some of which will be entirely out of your control. In situations like this, nobody would blame you for throwing in the towel and not bothering – but all is not lost.

By using certain tools and services, you can sidestep some of the pitfalls that could easily cause you to fail – ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Guidance on Sharing Cyber Incident Information

Original release date: April 7, 2022

CISA’s Sharing Cyber Event Information Fact Sheet provides our stakeholders with clear guidance and information about what to share, who should share, and how to share information about unusual cyber incidents or activity.

CISA uses this information from partners to build a common understanding ...

Continue Reading →
0
Page 1 of 3 123