Infosec for All, Shawn Bowman Protecting Yourself TOC Introduction Understanding Social Engineering Attacks Personal Protection Strategies Professional Protection Strategies Conclusion Bibliography Discussion Introduction Social engineering attacks a... attacks social engineering trust
Infosec for All, Shawn Bowman Why Use Encryption TOC Introduction Why ? How? Conclusion Bibliography Discussion Introduction Email has become an integral part of our daily communication, both personal and professional. However, the convenience of em... email encryption privacy
Infosec for All, Shawn Bowman Risks of Using Public Wi-Fi TOC Introduction Risks of Using Public Wi-Fi Man-in-the-Middle Attacks Unencrypted Connections Malware Distribution Rogue Wi-Fi Access Points Mitigating Public Wi-Fi Risks Use a VPN Avoid Sensitive Ac... public vpn wi-fi wifi
Infosec for All, Shawn Bowman Risks of Using Wi-Fi Networks TOC Introduction Risks of Using Wi-Fi Networks securing Wi-Fi Networks Conclusion Bibliography Discussion Introduction Wireless networking has become an integral part of our daily lives, offering conv... attacks vpn wi-fi wifi
Infosec for All, Shawn Bowman Maintaining Cybersecurity While Traveling TOC Introduction Securing Your Devices Connecting to Public Networks Protecting Your Data Staying Vigilant Overseas Conclusion Bibliography Discussion Introduction As cybersecurity professionals, we u... encryption on-the-go public travel
Infosec for All, Shawn Bowman The Impact of Containerization on Security TOC Introduction Security Benefits of Containers Security Risks and Challenges Best Practices for Container Security Conclusion Bibliography Discussion Introduction The widespread adoption of containe... cloud containers docker kubernetes
Infosec for All, Shawn Bowman Protecting Your Customers and Your Business TOC Introduction Understanding PCI DSS Steps for Very Small Businesses Additional Tips Conclusion Bibliography Discussion Introduction Accepting credit card payments is a near-necessity for businesses... DSS PCI credit card payment smb
Infosec for All, Shawn Bowman HIPAA Compliance for Very Small Businesses TOC Introduction Understanding HIPAA for Small Businesses Key Steps for Very Small Businesses Additional Considerations for Small Businesses The Benefits of HIPAA Compliance Bibliography Discussion In... hippa smb
Infosec for All, Shawn Bowman NIST Cybersecurity Framework TOC Introduction What is the NIST Cybersecurity Framework? Why Should Very Small Businesses Care? Implementing the NIST CSF for Very Small Businesses Practical Steps for VSBs Conclusion Bibliography D... NIST framework smb
Infosec for All, Shawn Bowman SIEM and SOAR TOC Introduction SIEM: The Foundation of Threat Detection SOAR: Streamlining and Automating Security Operations Closely Related Software Types How SIEM, SOAR, and Related Technologies Protect Against ... detection logs tools
Infosec for All, Shawn Bowman Social Engineering TOC Introduction Common Social Engineering Tactics The Devastating Impact of Social Engineering How to Protect Yourself and Your Organization Conclusion Bibliography Discussion Introduction Technical ... attacks social
Infosec for All, Shawn Bowman SQL Injection Vulnerabilities TOC Introduction Understanding SQL Injection Types of SQL Injection Consequences of SQL Injection Defensive Strategies Conclusion Bibliography Discussion Introduction SQL injection (SQLi) remains a pe... attacks coding