National Cyber Warfare Foundation (NCWF)

Blue Team (CND) - archive

You are in the archive area. It is only showing posts older than 3 months. You can find newer articles in the regular forum area.

Posts
Rating 
Resonance Hires Cybersecurity Pro George Skouroupathis As Its Offensive Security Lead
0 user ratings
2024-02-06 13:01:14
By: milo
2023 Cybersecurity Regulation Recap (Part 3): Privacy Protection
0 user ratings
2024-02-06 12:43:08
By: milo
EasyDMARC VS Proofpoint DMARC
0 user ratings
2024-02-06 12:43:07
By: milo
Google agrees to pay $350M to settle a lawsuit over a Google+ security lapse that exposed personal data; people who bought stock in 2018-2019 can get
0 user ratings
2024-02-06 12:01:30
By: milo
Google's TAG publishes a report on commercial spyware, detailing 40 vendors, and says global governments should take more aggressive steps to co
0 user ratings
2024-02-06 11:46:44
By: milo
How a $10B Enterprise Customer Drastically Increased their SaaS Security Posture with 201% ROI by Using SSPM
0 user ratings
2024-02-06 11:35:15
By: milo
U.S. Gov imposes visa restrictions on individuals misusing Commercial Spyware
0 user ratings
2024-02-06 11:13:28
By: milo
2054, Part II: Next Big Thing
0 user ratings
2024-02-06 11:07:06
By: milo
Latest Ivanti Zero Day Exploited By Scores of IPs
0 user ratings
2024-02-06 11:06:18
By: milo
Save $500 on This Unique Web-Based Cybersecurity Training Program for a Limited Time
0 user ratings
2024-02-06 10:05:10
By: milo
Google: Governments need to do more to combat commercial spyware
0 user ratings
2024-02-06 10:04:29
By: milo
Key Differences Between Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA)
0 user ratings
2024-02-06 09:45:21
By: milo
iOS sideloading & alternative app stores: Preparing for increased brand risk this March
0 user ratings
2024-02-06 08:09:25
By: milo
HPE is investigating claims of a new security breach
0 user ratings
2024-02-06 08:09:04
By: milo
Recent SSRF Flaw in Ivanti VPN Products Undergoes Mass Exploitation
0 user ratings
2024-02-06 08:08:20
By: milo
How Small and Mid-Sized Businesses Can Achieve System and Organization Controls (SOC 2) Compliance
0 user ratings
2024-02-06 07:02:26
By: milo
Closing the Gap: Safeguarding Critical Infrastructure s IT and OT Environments
0 user ratings
2024-02-06 07:02:25
By: milo
The Warning Shot: Two Years Later, Ukraine Is Just the Beginning
0 user ratings
2024-02-06 05:05:16
By: milo
Migrate Off That Old SIEM Already!
0 user ratings
2024-02-06 04:43:25
By: milo
USENIX Security 23 – FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
0 user ratings
2024-02-06 04:43:24
By: milo
Cybozu KUNAI for Android vulnerable to denial-of-service (DoS)
0 user ratings
2024-02-06 03:01:13
By: milo
How to Protect Against Supply-Chain Attacks | ARIA Cybersecurity
0 user ratings
2024-02-06 01:39:28
By: milo
Multiple out-of-bounds write vulnerabilities in Canon Office Small Office Multifunction Printers and Laser Printers
0 user ratings
2024-02-06 01:33:05
By: milo
Five Lessons from the Microsoft Identity Breach
0 user ratings
2024-02-06 01:16:44
By: milo
Beyond the basics: advanced insights into secrets management challenges
0 user ratings
2024-02-06 00:10:28
By: milo
This forum has 1546 pages of posts.
 
all forums
new post



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.