The Open Web Application Security Project (OWASP) is a nonprofit foundation that provides guidance on how to develop, purchase and maintain trustworthy and secure software applications. OWASP is noted for its popular Top 10 list of web application security vulnerabilities.
Duration: 15 minutes
Memory unsafety has plagued the software industry for decades and will continue to be a major source of vulnerabilities and real-world harm until top business leaders from the software manufacturers make appropriate investments and take ownership of the security outcomes of their customers.
Duration: 14 minutes
Password hygiene is the practice of selecting, managing and maintaining strong passwords to protect accounts and systems from cybercriminals. This includes, but is not limited to: Password creation – ensuring they are not obvious, common, or easy to hack.
Duration: 10 minutes
If source code gets leaked or stolen, it can cause massive damage to your organization. It’s not just about financial losses – it can also decrease customers’ trust and negatively impact your reputation. That’s why source code security should be among your priorities if it isn’t already.
Duration: 15 minutes
Data hygiene consists of actions that organizations can, and should, take as a matter of following not only compliance requirements, but also as part of basic risk management program practices. Consistent, risk-specific data hygiene practices supports not only a very wide range and number of data protection compliance requirements, but performing data hygiene activities also demonstrably improves an organization’s data security effectiveness without significantly increasing IT or information security costs. Most of these actions involve people performing activities that all personnel within an enterprise can take. No specialized tools are typically needed—just some training and ongoing awareness reminders, or periodic use of data management tools.
Duration: 15 minutes
Duration: 80 hours
Duration: 1 hour 25 min
This exciting, well-acted series of short episodes covers an array of cybersecurity awareness topics such as Social Engineering, Phishing Attacks, Cloud Services, Passwords, Ransomware, Travel Security and Insider Threats in the form of a story.
This is Season 02 of the Inside Man Series.
Duration: 106 minutes
This exciting, well-acted series of short episodes covers an array of cybersecurity awareness topics such as Social Engineering, Phishing Attacks, Cloud Services, Passwords, Ransomware, Travel Security and Insider Threats in the form of a story.
This is Season 03 of the Inside Man Series.
Duration: 88 minutes
This exciting, well-acted series of short episodes covers an array of cybersecurity awareness topics such as Social Engineering, Phishing Attacks, Cloud Services, Passwords, Ransomware, Travel Security and Insider Threats in the form of a story.
Duration: 110 minutes
This exciting, well-acted series of short episodes covers an array of cybersecurity awareness topics such as Social Engineering, Phishing Attacks, Cloud Services, Passwords, Ransomware, Travel Security and Insider Threats in the form of a story.
Duration: 122 minutes