#infosectraining โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #infosectraining, aggregated by home.social.
-
๐ง๐ฒ๐ฎ๐บ ๐๐๐ป๐ฎ๐บ๐ถ๐ฐ๐ & ๐๐ผ๐บ๐บ๐๐ป๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป: ๐ง๐ต๐ฒ ๐ฆ๐ฒ๐ฐ๐ฟ๐ฒ๐ ๐ช๐ฒ๐ฎ๐ฝ๐ผ๐ป๐ ๐ผ๐ณ ๐๐๐ฏ๐ฒ๐ฟ ๐๐ฒ๐ณ๐ฒ๐ป๐ฐ๐ฒ
#CyberSecurity #Teamwork #InformationSecurity #InfosecTraining #ProfessionalDevelopment #CyberSecurityAwareness #TeamDynamics #SoftSkills
-
๐จ Only have one day to train? Make it count!
Join us at OWASP Global AppSec US 2025 in Washington, D.C. for a full day of expert-led, hands-on Application Security training.
Pick from a curated lineup of 1-day courses designed to sharpen your skills in critical areas.
https://owasp.glueup.com/event/131624/register/
#OWASP2025 #AppSec #Cybersecurity #InfosecTraining #DevSecOps #ThreatModeling #PrivacySecurity #WashingtonDC #SecurityTraining
-
๐จ Only have one day to train? Make it count.
Join us on at OWASP Global AppSec USA 2025 in Washington, D.C. for a full day of expert-led, hands-on security training.
๐ฏ Whether you're a builder, breaker, defender, or manager, there's a course to help you go deeper.
๐ Register: https://owasp.glueup.com/event/131624/register/
#OWASP #AppSec #CyberSecurity #InfosecTraining #AIsecurity #ThreatModeling #DevSecOps #OWASP2025 #WashingtonDC #SecurityTraining #PrivacySecurity
-
Level up your web #appsecurity testing with the #OWASP #ASVS! Listen in to our live discussion with our security consultant Shanni Prutchi as she shares her #appsec expertise, happening here later today!
Join us & bring your ASVS questions. #infosectraining #applicationsecurity #BFLive
And don't forget about our Discord AMA starting at 1 PM MST.
-
Last Call For Registrations!
In 2 weeks we will be meeting in Vienna for a deep dive into #SocialEngineering & #OSINT!You can still join the 2-day training class "Practical Social Engineering & Open-source Intelligence for Security Teams" I will be delivering at this year's #DeepSec conference, in which you will...
๐ Learn how attackers leverage OSINT to identify organizational vulnerabilities.
๐ฏ Understand the psychology and methodology behind social engineering attacks.
๐ Acquire necessary skills & knowledge that will help you prevent and better simulate social engineering attack scenarios.
๐ผ Examine real-life case studies and attack methodologies.
๐ Build better protective measures, inform your security strategy, and learn to provide realistic insights to clients.Date: 14 & 15 November 2023
Location: Vienna, Austriaโฌ๏ธ Course Content & Registration Details: https://deepsec.net/speaker.html#WSLOT626
I look forward to seeing you there!
#socialengineeringtraining #cybersecurity #opensourceintelligence #osinttraining #infosectraining #infosec #deepsec2023
-
Debunking Cybersecurity Myths
Cybersecurity expert Eva Galperin โ @evacide โ helps debunk some common myths about cybersecurity.
โ๏ธโ Is the government watching you through your computer camera?
โ๏ธโ Does Google read all your Gmail?
โ๏ธโ Does a strong password protect you from hackers?
โ๏ธโ Will encryption keep my data safe?
โ๏ธโ Are all hackers bad people?
Eva answers all these questions and much more using clear language that's easy to understand.
Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation โ @eff
Rather read than listen? A helpful transcript is available.
https://www.wired.com/video/watch/expert-debunks-cybersecurity-myths
#Infosec #Cybersecurity #BeCyberSmart
#MoreThanAPassword #InfosecTraining
#DiceWare #Encryption #Passwords
#PasswordManagers #PublicWiFi #VPN
#EFF #ElectronicFrontierFoundation -
Debunking Cybersecurity Myths
Cybersecurity expert Eva Galperin โ @evacide โ helps debunk some common myths about cybersecurity.
โ๏ธโ Is the government watching you through your computer camera?
โ๏ธโ Does Google read all your Gmail?
โ๏ธโ Does a strong password protect you from hackers?
โ๏ธโ Will encryption keep my data safe?
โ๏ธโ Are all hackers bad people?
Eva answers all these questions and much more using clear language that's easy to understand.
Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation โ @eff
Rather read than listen? A helpful transcript is available.
https://www.wired.com/video/watch/expert-debunks-cybersecurity-myths
#Infosec #Cybersecurity #BeCyberSmart
#MoreThanAPassword #InfosecTraining
#DiceWare #Encryption #Passwords
#PasswordManagers #PublicWiFi #VPN
#EFF #ElectronicFrontierFoundation -
And the answer to the poll is . . . 1882!
Yup, itโs true. Asking someone to disclose their โmotherโs maiden nameโ as a security technique was first publicly described in 1882.
Thatโs the year Sacramento, CA banker โ Frank Miller โ published his book titled "Telegraphic Code: To Insure Privacy and Secrecy In The Transmission Of Telegrams."
This was the same book which described the first concept and implementation of the One-Time Pad.
Frank and his fellow banker buddies conducted high finance over the Internet of their day, the Telegraph, which was considered by many to be completely insecure; about as private as sending a postcard.
How did you transfer loads of your employerโs money securely over an insecure means of communication?
You used a telegraphic code book and combined it with other layers of security. Big $$$$s were involved, and no one wanted โ then or now โ to be the one who screwed up a transaction.
So โmotherโs maiden nameโ became one of the layers of security used in money transfers.
As they said on Battlestar Galactica: โAll this has happened before, and all this will happen again.โ
Interesting how things seem to repeat over and over.
Thanks to everyone who voted in the Poll!
#Infosec
#Cybersecurity
#MothersMaidenName
#InfosecTraining
#OneTimePad -
Debunking Cybersecurity Myths
Cybersecurity expert Eva Galperin -- @evacide -- helps debunk some common myths about cybersecurity.
โ๏ธโ Is the government watching you through your computer camera?
โ๏ธโ Does Google read all your Gmail?
โ๏ธโ Does a strong password protect you from hackers?
โ๏ธโ Will encryption keep my data safe?
โ๏ธโ Are all hackers bad people?
Eva answers all these questions and much more using clear language that's easy to understand.
Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation -- @eff
Rather read than listen? A helpful transcript is available.
https://www.wired.com/video/watch/expert-debunks-cybersecurity-myths
#Infosec #Cybersecurity #BeCyberSmart
#MoreThanAPassword #InfosecTraining
#DiceWare #Encryption #Passwords
#PasswordManagers #PublicWiFi #VPN
#EFF #ElectronicFrontierFoundation -
Debunking Cybersecurity Myths
Cybersecurity expert Eva Galperin -- @evacide -- helps debunk some common myths about cybersecurity.
โ๏ธโ Is the government watching you through your computer camera?
โ๏ธโ Does Google read all your Gmail?
โ๏ธโ Does a strong password protect you from hackers?
โ๏ธโ Will encryption keep my data safe?
โ๏ธโ Are all hackers bad people?
Eva answers all these questions and much more using clear language that's easy to understand.
Eva Galperin is the Director of Cybersecurity at the Electronic Frontier Foundation -- @eff
Rather read than listen? A helpful transcript is available.
https://www.wired.com/video/watch/expert-debunks-cybersecurity-myths
#Infosec #Cybersecurity #BeCyberSmart
#MoreThanAPassword #InfosecTraining
#DiceWare #Encryption #Passwords
#PasswordManagers #PublicWiFi #VPN
#EFF #ElectronicFrontierFoundation -
And the answer to the poll is . . . 1882!
Yup, itโs true. Asking someone to disclose their โmotherโs maiden nameโ as a security technique was first publicly described in 1882.
Thatโs the year Sacramento, CA banker โ Frank Miller โ published his book titled "Telegraphic Code: To Insure Privacy and Secrecy In The Transmission Of Telegrams."
This was the same book which described the first concept and implementation of the One-Time Pad.
Frank and his fellow banker buddies conducted high finance over the Internet of their day, the Telegraph, which was considered by many to be completely insecure; about as private as sending a postcard.
How did you transfer loads of your employerโs money securely over an insecure means of communication?
You used a telegraphic code book and combined it with other layers of security. Big $$$$s were involved, and no one wanted โ then or now โ to be the one who screwed up a transaction.
So โmotherโs maiden nameโ became one of the layers of security used in money transfers.
As they said on Battlestar Galactica: โAll this has happened before, and all this will happen again.โ
Interesting how things seem to repeat over and over.
Thanks to everyone who voted in the Poll!
#Infosec
#Cybersecurity
#MothersMaidenName
#InfosecTraining
#OneTimePad -
And the answer to the poll is . . . 1882!
Yup, itโs true. Asking someone to disclose their โmotherโs maiden nameโ as a security technique was first publicly described in 1882.
Thatโs the year Sacramento, CA banker โ Frank Miller โ published his book titled "Telegraphic Code: To Insure Privacy and Secrecy In The Transmission Of Telegrams."
This was the same book which described the first concept and implementation of the One-Time Pad.
Frank and his fellow banker buddies conducted high finance over the Internet of their day, the Telegraph, which was considered by many to be completely insecure; about as private as sending a postcard.
How did you transfer loads of your employerโs money securely over an insecure means of communication?
You used a telegraphic code book and combined it with other layers of security. Big $$$$s were involved, and no one wanted โ then or now โ to be the one who screwed up a transaction.
So โmotherโs maiden nameโ became one of the layers of security used in money transfers.
As they said on Battlestar Galactica: โAll this has happened before, and all this will happen again.โ
Interesting how things seem to repeat over and over.
#Infosec
#Cybersecurity
#MothersMaidenName
#InfosecTraining
#OneTimePad