Best Practices for Enterprise Security http://technet.microsoft.com/en-us/library/cc750076.aspx
Best Practices for Enterprise Security http://technet.microsoft.com/en-us/library/cc750076.aspx
Metasploit: A Penetration Tester’s Guide to IPM… | SecurityStreet https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi
EMET 4.0 Security Strategy and Installation Step-By-Step https://www.trustedsec.com/july-2013/emet-4-0-security-strategy-and-installation-step-by-step/
How to stay anonymous on the Internet http://linuxlantern.com/how-to-stay-anonymous-on-the-internet/
Top 10 real hacking videos https://www.youtube.com/watch?v=vviaj3mK4WA
The 5 most common #hacking methods: http://t.co/yY8vZFi3ro <– And to avoid them : Awareness, hardening, secure coding and patching. http://twitter.com/PrometricCyber/status/345635858076008448/photo/1
Adding Vulnerability Scanning Capabilities to Nmap with NSE Vulscan 1.0 | ToolsWatch.org – The Hackers Arsenal Tools | Repository for vFeed and DPE Projects http://www.toolswatch.org/2013/06/adding-vulnerability-scanning-capabilities-to-nmap-with-nse-vulscan-1-0/
BYOD blues: What to do when employees leave – CSO Online – Security and Risk http://www.csoonline.com/article/735441/byod-blues-what-to-do-when-employees-leave?source=rss_data_protection
Securing access to AWS using MFA – Part I http://blogs.aws.amazon.com/security/post/Tx1KJ4H6H5R80UD/Securing-access-to-AWS-using-MFA-Part-I