Remove topic application-security
article thumbnail

Declassified NSA Newsletters

Schneier on Security

According to the jacket, Schneier is a data security expert with a master’s degree in computer science. It has sections on such-diverse topics as number theory, zero knowledge proofs, complexity, protocols, DES, patent law, and the Computer Professionals for Social Responsibility. protocols and source code.

Internet 256
article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Anton on Security

Cloud Security Podcast by Google?—?Popular Popular Episodes by Topic This is simply a post that categorizes our podcast episodes by topic and then by download/listen count. Data security “Data Security in the Cloud“ “Modern Data Security Approaches: Is Cloud More Secure?”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Electronic communication policy

Tech Republic Security

It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications.

112
112
article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

This article aims to provide a comprehensive list of cybersecurity research topics suitable for beginners, helping them delve into the fundamentals of this rapidly evolving field. Network Security: Study network protocols, such as TCP/IP, and analyze common network attacks like DDoS, phishing, and man-in-the-middle attacks.

article thumbnail

A Faster Path to Memory Safety: CHERI, Memory Tagging, and Control Flow Integrity

Security Boulevard

Recently, the White House published a technical paper asking organizations to develop roadmaps for implementing memory safety in their software applications. The post A Faster Path to Memory Safety: CHERI, Memory Tagging, and Control Flow Integrity appeared first on Security Boulevard.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

Whether you’re passionate about securing networks, protecting data, or investigating cyber threats, choosing the right research topic is crucial for a successful and impactful Master’s journey. Cloud Security: Examine the unique security considerations and vulnerabilities in cloud computing environments.

article thumbnail

Best Practices for Mobile App Security Testing for Developers & Non-Developers

Appknox

Mobile application security testing (MAST) covers a wide range of topics, including authentication, authorization, data security, session management, and vulnerabilities for hacking.

Mobile 98