Found 7,402 presentations matching your search
A Time Machine to pinpoint vulnerabilities. Memory-based vulnerabilities are a major source of atta...
This presentation explains how Web Application Firewalls (WAF), when combined with Behavior Analysis...
Title: Understanding Insider Threats in Cybersecurity Description: Insider attacks present a signif...
The key principles, threats, and best practices of cybersecurity in software development. It highlig...
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, ...
Cybersecurity has become indispensable, considering the current market status and the increasing num...
Ethical hacking involves proactively identifying and addressing security vulnerabilities in systems ...
F5 Networks offers guidance to security and network architects in designing, deploying, and managing...
The average cost of a data breach in 2024 has spiked to $6.5 million per incident, a 150% increase o...
Topics to be covered Need for Security, Business Needs, Threats, Attacks, Legal, ...
Betaloc Tablets are used to treat several symptoms including high blood pressure, hypertension,...
Vehicular Ad-hoc Networks (VANETs) are specialized type of Mobile Ad-hoc Networks (MANETs) developed...
Slides of a talk I gave at Gosec 25 in Montréal about how machine learning can help cybersecurity p...
Ethical hacking involves identifying and exploiting vulnerabilities in computer systems and networks...
This presentation provides a clear explanation of cryptography and its techniques. It will also cove...
Network security in the digital era has become quite important since there has been an increased sop...
Ransomware attacks have grown in both frequency and sophistication over the years, and 2024 is shapi...
Web Applications Hacking – Ruby on Rails example. Attack web applications by using SQL attacks, CS...
Cybercrime can include many different types of profit-driven criminal activity, including ransomware...
An introduction to asymmetric cryptography with an in-depth look at RSA, Diffie-Hellman, the FREAK a...
herpes simplex virus is a double stranded DNA virus causing many symptoms all over the body. it affe...
Mobile Ad-Hoc Networks (MANETs) are wireless networks characterized by their lack of a fixed infrast...