cissp
16.2K subscribers
955 photos
66 videos
1.73K files
4.81K links
@cissp
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood
Download Telegram
GARD will be designed to approach this problem differently using a far broader approach to attack types and be far more agile in its ability to both identify and respond to an attack. 
I see this as an AI-driven defense against an AI targeted threat and critical to the growing potential for an AI-driven attack that could circumvent existing defenses.  
Wrapping Up: GARD Is Critical
We are entering a new age, but we already see huge problems with the massive proliferation of false information and equally massive attempts to corrupt information gathering systems with this false data. To combat this, DARPA has defined a program called GARD, and both Intel and Georgia Tech have stepped up to help make us safe.  Here is hoping that this effort is successful because if it isn’t, the outcome could be extremely dire. 
‏On March 31, network security provider Palo Alto Networks (PAN) announced its intent to acquire software-defined wide-area network (SD-WAN) pioneer CloudGenix for about $420 million in cash. This is a healthy, albeit fair, premium for a company that has an estimated revenue of $45 million with about 250 customers. 
‏For context, VMware paid roughly the same for VeloCloud in 2017. The CloudGenix customer base comprises many Fortune 1000 companies with strengths in health care, retail, manufacturing, finance, tech and hospitality. 
‏The addition of CloudGenix brings SD-WAN into the PAN portfolio. security is shifting away from point products to platforms, and PAN has one of the best platform stories in the industry
‏An awesome list of resources for training, conferences, speaking, labs, reading, etc that are free all the time or during COVID-19 that cybersecurity professionals with downtime can take advantage of to improve their skills and marketability to come out on the other side ready to rock.

https://github.com/gerryguy311/CyberProfDevelopmentCovidResources
Forwarded from بینام
Threat Modeling.pdf
5.9 MB
⚠️ WARNING !!!

It's possible to hack iPhones / iPads just by sending an email to targeted users.

Hackers have been exploiting critical 0-click + 0-day RCE vulnerability in the default mail app installed on millions of Apple devices.

Details — https://thehackernews.com/2020/04/zero-day-warning-its-possible-to-hack.html
Cyber security program- 10 Top University
3TB Course Collection
( PenTest , Hacking)
https://drive.google.com/drive/mobile/folders/1PDYZo2zMIJjERU3HqW-noSQACSqHuYPR/1rE6r67r1vsDrVxvAd5StXWSNGgsMpH5r?sort=13&direction=a

Course Password :
- www.ethicalhackx.com
———————————
Network+ video courses:
https://mega.nz/#F!e75VmKJT!8Kc8MzSWKrhqQE4oVhJooA

Security+ video Courses:
https://mega.nz/#F!H3pH0ACB!OEtXp59qZIqMh7oQI5Gcdg

CySA+ Video Courses:
https://mega.nz/#F!66pXSYTT!GjbQkKXxT3dIWx-w5a47LA

Android Pocketprep Premium apks: https://mega.nz/#F!ijxn1aKC!c-1ENzRpuXKInWwGdy8EGA

various books, course notes, practice exams:
https://mega.nz/#F!HrRlAa4a!HN-LxlJ8fM-uPwSHGi5fGg
———————————
✌🏼👇🏻😊
To support team activities such as
(Distribution of free specialized educational resources for cyber security-Transfer of experiences-Information security awareness,...) to create a safer cyberspace 👍🏽👌🏽
4 example Buy a coffee for us😇
BTC ADDRESS:
19aJaUH48tiLCJ5WZHnMmZYKFWH11UtfmU

https://blockchain.info/address/1CLHQVh9qeHY14Ze3ReYkjyESAVt1ivzd7