Quantcast
Browsing all 34 articles
Browse latest View live

ICTTF FRANCE

CYBER-CRIMINALITY INVESTIGATION

View Article


CoderDojo Mentors

A group for those running or interested in running CoderDojo's. More information on CoderDojo can be found at www.CoderDojo.com

View Article


Stop Cyber Bullies

Cyber Bullying represents an all too real threat to children. In this group we discuss how this issue can be managed and dealt with.

View Article

Dublin Chapter - Cyber Security Roundtable

An ICTTF Security Roundtable Chapter is a chance for you to become involved in a community of professionals. Get involved with your local chapter and you will make valuable connections with peers,...

View Article

Cyber Security in Social Media

Unscrupulous Enterprises Are Using Social Media Especially Facebook To Spread Malware Via Links Being Spread By Fake Profiles and Paid Sponsored Ads

View Article


Pbxwall

Setting the standard in Phone Fraud protection. Innovative anti-fraud technology that blocks PBX Hacking and stops Toll Fraud.

View Article

System Infiltration

A group to discuss conventional and nonconventional methods used by cyber criminals to infiltrate, disrupt or disable components of a technology based infrastructure. Ways to defend against such...

View Article

Human Side of the Insider Threat

This group will discuss causal factors and mitigations for minimizing the growth of insider threats within government agencies and commercial companies.

View Article


ETHiCAL HACKING

Some would argue that Ethical hacking and Penetration Testing is the same thing, Ummm Yes and No. This group will help with how to best understand the difference and to discuss the tools and techniques...

View Article


Information Security Awareness

INformation Security Awareness is sometimes a common category that is often times miss-understood. While there is an tremendous amount of awareness materials for individuals as well as organizations...

View Article

Digital Forensics

Share digital forensics best practices, opinions, ideas and help on technical issues

View Article

Myanmar Information Security Professionals

View Article

Computer Security Incident Response Team

A Computer Security Incident Response Team (CSIRT) is a service organization that is responsible for receiving, reviewing, and responding to computer security incident reports and activity. Their...

View Article


Multidisciplinary Cyber Security Studies

Information Security, Penetration Testing, Incident Management, Perception Management, International Relations, Sociology, Psychology, Criminology, Identity Construction

View Article
Browsing all 34 articles
Browse latest View live