Browse Alphabetically
Browse Articles begining with the letter O
Updated for the CISSP CBK 2015 edition that will come into effect on the 15th of April 2015. Get your copy now.
Categories: CISSP CBK 2015  · CISSP Study Books 
29.03.2015 · From
The forums on the site are accessible to all members, even non paying members. This is where you can ask questions and get answers quickly. You can also subscribe to the forums you like to get an email when an answer is provided.
Categories: Forums on the site 
10.10.2014 · From
Xenotix provides Zero False Positive XSS Detection by performing the Scan within the browser engines where in real world, payloads get reflected. Xenotix Scanner Module is incorporated with 3 intelligent fuzzers to reduce the scan time and produce better results. If you really don't like the tool logic, then leverage the power of Xenotix API to make the tool work like you wanted it to be.
Categories: Web Vulnerabilities Scanners  · OWASP  · Fuzzes 
15.09.2014 · From
See below an open letter I have sent to (ISC)2 to express my concern about the practice of forcing users to read their legal agreement under pressure and a short time limit. Something against best practices that we usually preach as security professionals.
Categories: ISC2 Exam polcies and rules  · CISSP exam  · CISSP 
16.07.2014 · From
A full two-thirds of the world’s web servers use the OpenSSL implementation of web cryptographic protocols, ensuring safe transmission of data. However, in recent months some serious questions have arise as whether or not it is as secure as we taught.
Categories: SSL and TLS  · OpenSSL  · LibreSSL  · BoringSSL 
12.07.2014 · From
ITIL is the most widely accepted approach to IT service management in the world. ITIL provides a cohesive set of best practice, drawn from the public and private sectors internationally.
Categories: Security Frameworks  · ITIL 
09.05.2014 · From