home.social

#infosectraining โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #infosectraining, aggregated by home.social.

  1. ๐—ง๐—ฒ๐—ฎ๐—บ ๐——๐˜†๐—ป๐—ฎ๐—บ๐—ถ๐—ฐ๐˜€ & ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: ๐—ง๐—ต๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐—ฟ๐—ฒ๐˜ ๐—ช๐—ฒ๐—ฎ๐—ฝ๐—ผ๐—ป๐˜€ ๐—ผ๐—ณ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฐ๐—ฒ

    #CyberSecurity #Teamwork #InformationSecurity #InfosecTraining #ProfessionalDevelopment #CyberSecurityAwareness #TeamDynamics #SoftSkills

    youtu.be/q7nWl6TAMmI

  2. ๐Ÿšจ Only have one day to train? Make it count!

    Join us at OWASP Global AppSec US 2025 in Washington, D.C. for a full day of expert-led, hands-on Application Security training.

    Pick from a curated lineup of 1-day courses designed to sharpen your skills in critical areas.

    owasp.glueup.com/event/131624/

    #OWASP2025 #AppSec #Cybersecurity #InfosecTraining #DevSecOps #ThreatModeling #PrivacySecurity #WashingtonDC #SecurityTraining

  3. ๐Ÿšจ Only have one day to train? Make it count.

    Join us on at OWASP Global AppSec USA 2025 in Washington, D.C. for a full day of expert-led, hands-on security training.

    ๐ŸŽฏ Whether you're a builder, breaker, defender, or manager, there's a course to help you go deeper.

    ๐Ÿ”— Register: owasp.glueup.com/event/131624/

    #OWASP #AppSec #CyberSecurity #InfosecTraining #AIsecurity #ThreatModeling #DevSecOps #OWASP2025 #WashingtonDC #SecurityTraining #PrivacySecurity

  4. Level up your web #appsecurity testing with the #OWASP #ASVS! Listen in to our live discussion with our security consultant Shanni Prutchi as she shares her #appsec expertise, happening here later today!

    Join us & bring your ASVS questions. #infosectraining #applicationsecurity #BFLive

    And don't forget about our Discord AMA starting at 1 PM MST.

    bfx.social/4601Aqt

  5. Last Call For Registrations!
    In 2 weeks we will be meeting in Vienna for a deep dive into #SocialEngineering & #OSINT!

    You can still join the 2-day training class "Practical Social Engineering & Open-source Intelligence for Security Teams" I will be delivering at this year's #DeepSec conference, in which you will...

    ๐ŸŒ Learn how attackers leverage OSINT to identify organizational vulnerabilities.
    ๐ŸŽฏ Understand the psychology and methodology behind social engineering attacks.
    ๐Ÿ” Acquire necessary skills & knowledge that will help you prevent and better simulate social engineering attack scenarios.
    ๐Ÿ’ผ Examine real-life case studies and attack methodologies.
    ๐Ÿ“š Build better protective measures, inform your security strategy, and learn to provide realistic insights to clients.

    Date: 14 & 15 November 2023
    Location: Vienna, Austria

    โฌ‡๏ธ Course Content & Registration Details: deepsec.net/speaker.html#WSLOT

    I look forward to seeing you there!

    #socialengineeringtraining #cybersecurity #opensourceintelligence #osinttraining #infosectraining #infosec #deepsec2023

  6. Debunking Cybersecurity Myths

    Cybersecurity expert Eva Galperin โ€” @evacide โ€” helps debunk some common myths about cybersecurity.

    โ˜‘๏ธโ€‹ Is the government watching you through your computer camera?

    โ˜‘๏ธโ€‹ Does Google read all your Gmail?

    โ˜‘๏ธโ€‹ Does a strong password protect you from hackers?

    โ˜‘๏ธโ€‹ Will encryption keep my data safe?

    โ˜‘๏ธโ€‹ Are all hackers bad people?

    Eva answers all these questions and much more using clear language that's easy to understand.

    Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation โ€” @eff

    Rather read than listen? A helpful transcript is available.

    wired.com/video/watch/expert-d

    #Infosec #Cybersecurity #BeCyberSmart
    #MoreThanAPassword #InfosecTraining
    #DiceWare #Encryption #Passwords
    #PasswordManagers #PublicWiFi #VPN
    #EFF #ElectronicFrontierFoundation

  7. Debunking Cybersecurity Myths

    Cybersecurity expert Eva Galperin โ€” @evacide โ€” helps debunk some common myths about cybersecurity.

    โ˜‘๏ธโ€‹ Is the government watching you through your computer camera?

    โ˜‘๏ธโ€‹ Does Google read all your Gmail?

    โ˜‘๏ธโ€‹ Does a strong password protect you from hackers?

    โ˜‘๏ธโ€‹ Will encryption keep my data safe?

    โ˜‘๏ธโ€‹ Are all hackers bad people?

    Eva answers all these questions and much more using clear language that's easy to understand.

    Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation โ€” @eff

    Rather read than listen? A helpful transcript is available.

    wired.com/video/watch/expert-d

    #Infosec #Cybersecurity #BeCyberSmart
    #MoreThanAPassword #InfosecTraining
    #DiceWare #Encryption #Passwords
    #PasswordManagers #PublicWiFi #VPN
    #EFF #ElectronicFrontierFoundation

  8. And the answer to the poll is . . . 1882!

    Yup, itโ€™s true. Asking someone to disclose their โ€œmotherโ€™s maiden nameโ€ as a security technique was first publicly described in 1882.

    Thatโ€™s the year Sacramento, CA banker โ€” Frank Miller โ€” published his book titled "Telegraphic Code: To Insure Privacy and Secrecy In The Transmission Of Telegrams."

    This was the same book which described the first concept and implementation of the One-Time Pad.

    Frank and his fellow banker buddies conducted high finance over the Internet of their day, the Telegraph, which was considered by many to be completely insecure; about as private as sending a postcard.

    How did you transfer loads of your employerโ€™s money securely over an insecure means of communication?

    You used a telegraphic code book and combined it with other layers of security. Big $$$$s were involved, and no one wanted โ€” then or now โ€” to be the one who screwed up a transaction.

    So โ€œmotherโ€™s maiden nameโ€ became one of the layers of security used in money transfers.

    As they said on Battlestar Galactica: โ€œAll this has happened before, and all this will happen again.โ€

    Interesting how things seem to repeat over and over.

    Thanks to everyone who voted in the Poll!

    #Infosec
    #Cybersecurity
    #MothersMaidenName
    #InfosecTraining
    #OneTimePad

  9. Debunking Cybersecurity Myths

    Cybersecurity expert Eva Galperin -- @evacide -- helps debunk some common myths about cybersecurity.

    โ˜‘๏ธโ€‹ Is the government watching you through your computer camera?

    โ˜‘๏ธโ€‹ Does Google read all your Gmail?

    โ˜‘๏ธโ€‹ Does a strong password protect you from hackers?

    โ˜‘๏ธโ€‹ Will encryption keep my data safe?

    โ˜‘๏ธโ€‹ Are all hackers bad people?

    Eva answers all these questions and much more using clear language that's easy to understand.

    Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation -- @eff

    Rather read than listen? A helpful transcript is available.

    wired.com/video/watch/expert-d

    #Infosec #Cybersecurity #BeCyberSmart
    #MoreThanAPassword #InfosecTraining
    #DiceWare #Encryption #Passwords
    #PasswordManagers #PublicWiFi #VPN
    #EFF #ElectronicFrontierFoundation

  10. Debunking Cybersecurity Myths

    Cybersecurity expert Eva Galperin -- @evacide -- helps debunk some common myths about cybersecurity.

    โ˜‘๏ธโ€‹ Is the government watching you through your computer camera?

    โ˜‘๏ธโ€‹ Does Google read all your Gmail?

    โ˜‘๏ธโ€‹ Does a strong password protect you from hackers?

    โ˜‘๏ธโ€‹ Will encryption keep my data safe?

    โ˜‘๏ธโ€‹ Are all hackers bad people?

    Eva answers all these questions and much more using clear language that's easy to understand.

    Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation -- @eff

    Rather read than listen? A helpful transcript is available.

    wired.com/video/watch/expert-d

    #Infosec #Cybersecurity #BeCyberSmart
    #MoreThanAPassword #InfosecTraining
    #DiceWare #Encryption #Passwords
    #PasswordManagers #PublicWiFi #VPN
    #EFF #ElectronicFrontierFoundation

  11. And the answer to the poll is . . . 1882!

    Yup, itโ€™s true. Asking someone to disclose their โ€œmotherโ€™s maiden nameโ€ as a security technique was first publicly described in 1882.

    Thatโ€™s the year Sacramento, CA banker โ€” Frank Miller โ€” published his book titled "Telegraphic Code: To Insure Privacy and Secrecy In The Transmission Of Telegrams."

    This was the same book which described the first concept and implementation of the One-Time Pad.

    Frank and his fellow banker buddies conducted high finance over the Internet of their day, the Telegraph, which was considered by many to be completely insecure; about as private as sending a postcard.

    How did you transfer loads of your employerโ€™s money securely over an insecure means of communication?

    You used a telegraphic code book and combined it with other layers of security. Big $$$$s were involved, and no one wanted โ€” then or now โ€” to be the one who screwed up a transaction.

    So โ€œmotherโ€™s maiden nameโ€ became one of the layers of security used in money transfers.

    As they said on Battlestar Galactica: โ€œAll this has happened before, and all this will happen again.โ€

    Interesting how things seem to repeat over and over.

    Thanks to everyone who voted in the Poll!

    #Infosec
    #Cybersecurity
    #MothersMaidenName
    #InfosecTraining
    #OneTimePad

  12. And the answer to the poll is . . . 1882!

    Yup, itโ€™s true. Asking someone to disclose their โ€œmotherโ€™s maiden nameโ€ as a security technique was first publicly described in 1882.

    Thatโ€™s the year Sacramento, CA banker โ€” Frank Miller โ€” published his book titled "Telegraphic Code: To Insure Privacy and Secrecy In The Transmission Of Telegrams."

    This was the same book which described the first concept and implementation of the One-Time Pad.

    Frank and his fellow banker buddies conducted high finance over the Internet of their day, the Telegraph, which was considered by many to be completely insecure; about as private as sending a postcard.

    How did you transfer loads of your employerโ€™s money securely over an insecure means of communication?

    You used a telegraphic code book and combined it with other layers of security. Big $$$$s were involved, and no one wanted โ€” then or now โ€” to be the one who screwed up a transaction.

    So โ€œmotherโ€™s maiden nameโ€ became one of the layers of security used in money transfers.

    As they said on Battlestar Galactica: โ€œAll this has happened before, and all this will happen again.โ€

    Interesting how things seem to repeat over and over.

    #Infosec
    #Cybersecurity
    #MothersMaidenName
    #InfosecTraining
    #OneTimePad