Sign In Help
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
(ISC)²
  • Community
  • Community
  • Discussions
    • Welcome
    • Tech Talk
    • Industry News
    • Privacy
    • Governance, Risk, Compliance
    • Threats
    • Cloud Security
  • Members
    • Member Support
    • Member Talk
    • CPE Opportunities
    • Chapters
    • ISC2 Security Congress
  • Certification
    • Exams
    • Exam Preparation
    • Become A Member
  • Groups
    • Certification Groups
    • Study Groups
    • Special Interest Groups
  • Chapters
    • Asia Pacific Chapter Groups
    • Europe, Middle East, Africa Chapter Groups
    • Latin America Chapter Groups
    • North America Chapter Groups
  • Career
    • Cybersecurity Job Openings
    • Career Discussions
  • Blog

Images in Profile (AppDefects)

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • ISC2 Community
  • :
  • Albums for Community
  • :
  • Images in Profile (AppDefects)

Images in Profile (AppDefects)

  • Albums
  • All Images
Album Privacy: Public
  • « Previous
    • 1
    • 2
    • 3
  • Next »

Profile (AppDefects)

  • m.jpg
  • If-Star-Wars-Characters-Were-Programmers.jpg
  • crickets.jpg
  • Which cryptocurrency exit scam bought this McLaren?
  • How many competing Bitcoin forks do we need?  Source: https://www.visualcapitalist.com/major-bitcoin-forks-subway-map/
  • Hash function comparison.
  • Encryption matters!
  • bugfeature.jpg
  • pencil.jpg
  • UAT what a novel idea!
  • Remember password I do.
  • kudos vs solutions.PNG
  • Another variation...
  • Use the force... for good!
  • A December 2019 study by University of Plymouth Professor Steve Furnell assessed the effectiveness of 16 password meters that people are likely to encounter online. While most meters effectively steer users towards more secure passwords, some will over-rate even the most commonly used ones that are found on top 10 "worst-passwords" lists.  One positive finding was that a browser-generated password was consistently rated strong. There was no mention of password managers and the strength of the passwords they generate. The paper is behind a pay-wall. An overview is given here: https://www.sciencedaily.com/releases/2019/12/191219090745.htm
  • docker registry.png
  • You’ve got two choices: 1) let us slide a syringe between your thumb and index finger so we can inject a rice-sized microchip into your hand that can be used to unlock your admin privileges, open doors, and clock in, or 2) find another job. Recently, I had no choice since I did not work in Indiana where this practice is unlawful according to House Bill 1143.
  • The IowaReporterApp was so insecure that vote totals, passwords and other sensitive information could have been intercepted or even changed, according to officials at Massachusetts-based Veracode.
  • Loving the lower 2020 fee's after being hit hard last year.
  • The SurfingAttack leverages the unique properties of acoustic transmission in solid materials to enable multiple rounds of interactions between the voice-controlled device and the attacker over a longer distance and without the need to be in line-of-sight. https://surfingattack.github.io/papers/NDSS-surfingattack.pdf
  • No privacy in pandemic times.
  • WFH.png
  • Matched users will then be prompted to report their exposure to the Ministry of Health using a special link.
  • Analysis by Omri Segev Moyal
  • mythbusters-25.png
  • VPN Login Overload!
  • 2018 Chapters Challenge Coin.JPG
  • Apple COVID-19 App
  • coin.PNG
  • process.png
Powered by Khoros
  • ISC2
  • About ISC2
  • Certifications
  • Education & Training
  • Members
  • Events
  • Chapters
  • Contact

Social Media

  • Facebook
  • Linkedin
  • Twitter
  • YouTube
©Copyright 1996-2026. ISC2, Inc. All Rights Reserved.

All contents of this site constitute the property of ISC2, Inc. and may not be copied, reproduced or distributed without prior written permission. ISC2, CISSP, SSCP, CCSP, CGRC, CSSLP, HCISPP, ISSAP, ISSEP, ISSMP, CC, and CBK are registered marks of ISC2, Inc.