Security
Data Privacy & Compliance Protecting personal and confidential information according to legal and regulatory requirements. Ethical Hacking & Penetration Testing Testing computer systems and networks to identify and fix security vulnerabilities, using methods similar to those of attackers. Malware & Antivirus Software that detects, prevents, and removes malicious software (malware) from computers and networks. Security Policy Guidelines and procedures that define and enforce an organization’s security objectives and practices. The Lockdown Lounge A communication bridge between developers, sysadmins, support, and security. Network & Endpoint Security Protecting network and devices from unauthorized access, malware, and other security threats. Firewalls & Intrusion Detection Systems (IDS) Security systems that monitor and control network traffic to protect against unauthorized access and attacks. Security Bulletins Security feeds from various 3rd party sites.
Topic | Replies | Views | Activity | |
---|---|---|---|---|
About the Security category |
![]() |
0 | 0 | May 2, 2025 |
What's your EDR of choice? |
![]() |
0 | 5 | May 5, 2025 |
Security Policy Template |
![]() |
0 | 1050 | May 10, 2023 |
Whats everyone using for Antivirus / EDR? |
![]() |
0 | 1147 | April 26, 2023 |
[CTI] What is Cyber Threat Intelligence? Should I care? |
![]() |
0 | 1317 | April 18, 2023 |
Whats your favorite brand of firewall? |
![]() ![]() |
2 | 1253 | April 13, 2023 |
[ATT&CKs & TTPs] Cobalt Strike: Understanding Ransomware's Favorite Tool |
![]() |
0 | 672 | April 12, 2023 |
Creating ED25519 SSH Keys |
![]() |
0 | 1440 | September 23, 2022 |