article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

The CEH certification from the EC-Council was introduced in 2003 and is now in version 11. Key skills acquired include managing and encrypting a zero-trust environment, deploying VPNs and SSL/SSH encryption, analyzing firewall logs and configuring security controls, and mitigating vulnerabilities using packet capture and analysis.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

If the US government dictating iPhone encryption design sounds ok to you, ask yourself how you'll feel when China demands the same. Since 2003, Bejtlich’s blog TaoSecurity has been a leading resource for network security monitoring practices and cybersecurity trends. — Matthew Green (@matthew_d_green) February 17, 2016.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

Be it advanced locks, encryption barriers, or deleted and unknown content, the UFED (Universal Forensic Extraction Device) can extract physical and logical data. Other significant Xplico features include multithreading, SQLite or MySQL integration, no data entry limits, and can execute reserve DNS lookup from DNS pack.

Software 138
article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

After being released in 2003, he uses WiFi to commit attacks, program malware and steal credit card information. 2002 – Internet Attack — By targeting the thirteen Domain Name System (DNS) root servers, a DDoS attack assaults the entire Internet for an hour. 2003 — Operation CyberSweep — The U.S. billion dollars in damages.