In the 21st century world of business, cyber security is more important than ever. Ethical hacking and network defence are two skills employed by cyber security professionals to secure networks and guard information and people.
In the 21st century world of business, cyber security is more important than ever. Ethical hacking and network defence are two skills employed by cyber security professionals to secure networks and guard information and people.
Pure Hacking, Australia's leading specialist information security consultancy today confirmed the appointment of two new security experts and the establishment of a new Strategic Security Practice. The new hires, Jonathan Carter, Principal Security Consultant and Head of Strategic Security, together with David Muscat, Senior Security Consultant will be responsible for security and governance consulting reviews against systems, networks, devices and applications for clients across a variety of industry sectors.
- Pure Hacking, the Australian experts in helping organisations protect their information assets today confirmed that its Chief Technology Officer, Ty Miller, has been confirmed on the official Black Hat 2011 conference program as a Trainer. Miller will be running a multi-day, high intensity training course, 'The Shellcode Lab' to develop and understand shellcode in a hands-on environment. Course attendees will gain a thorough knowledge and practical skill set on how to create shellcode and tune their elite security skills. This is the second program appearance for Miller at the world's most high profile security event. He previously presented his development of 'Reverse DNS Tunneling Shellcode' at the Black Hat event in 2008.
Spot on Ms Roy. Along with this goes the trend to short, job ready courses at universities, expounded once by[…]
That MSI dragon laptop looks cool! But $11,799 ....... :O I might think on a bit longer :)
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]