Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

Search

Show Filters
Result Filters:

17 Results Found for "azure"

Results per page: 10 40 80

Five Security Concerns with Mobile Payment Systems

White Paper | March 10, 2015

Learn about the five major security concerns with mobile payment systems before you link your finances to a mobile device for payments. Download your copy!

Pen Test Legal Issues

Article | Nov. 13, 2014

Pen testers beware. Whether you believe you know and understand all the potential legal issues, read on. First of all, a penetration test or “pen test” is a method that’s used to evaluate the security and/or vulnerabilities in a network. This test is normally conducted externally wherein the tester is attempting to hack a network or computer. Breaking into computers and networks is illegal under the Computer Fraud and Abuse Act (CFAA), and depending on your activities and other factors, other federal laws and state laws may be broken.

Zero Day Exploits

White Paper | Oct. 23, 2012

A zero day exploit is an attack that was previously unknown to the target or security experts in general.

10 Ways Malicious Code Reaches Your Private Network

White Paper | July 13, 2010

Learn 10 common ways that malicious code can penetrate your network.

Security and the Rise of Machine-to-Machine (M2M) Communications

White Paper | Aug. 26, 2014

Kerry Doyle discusses Security and the Rise of Machine-to-Machine (M2M) Communications to help avoid any security risk in the future. Learn more here.

Top 10 Cybersecurity Risks: How Prepared Are You for 2013?

White Paper | Jan. 24, 2013

When it comes to cyber security, we have a lot to look out for, take precautions against and be paranoid about. Learn more about these cybersecurity risks here.

Cybersecurity Specialization: DevSecOps

Course Code: 840102

ExclusiveDevSecOps is designed to empower you with the knowledge and skills necessary to seamlessly integrate security into your DevOps pipeline. You will gain a deep understanding of DevSecOps principles and practices, ensuring that security is an integral part of your softw...

Delivery Formats

Hacking Back In Self-Defense: Is It Legal? Should It Be?

Webinar – Recorded | Feb. 01, 2012

Discover is hacking back In self-defense is legal and if it should be in our webinar.

Working from home – a hacker’s paradise!

Webinar – Recorded | Oct. 09, 2020

With the increase in remote work, it is important for both individuals and companies to be aware of the added cybersecurity risks

Cybersecurity: Physical Security

Webinar – Recorded | May 26, 2014

Learn about physical security for cybersecurity in our webinar.