Infosec for All, Shawn Bowman Risks of Using Wi-Fi Networks TOC Introduction Risks of Using Wi-Fi Networks securing Wi-Fi Networks Conclusion Bibliography Discussion Introduction Wireless networking has become an integral part of our daily lives, offering conv... attacks vpn wi-fi wifi
Infosec for All, Shawn Bowman Maintaining Cybersecurity While Traveling TOC Introduction Securing Your Devices Connecting to Public Networks Protecting Your Data Staying Vigilant Overseas Conclusion Bibliography Discussion Introduction As cybersecurity professionals, we u... encryption on-the-go public travel
Infosec for All, Shawn Bowman The Impact of Containerization on Security TOC Introduction Security Benefits of Containers Security Risks and Challenges Best Practices for Container Security Conclusion Bibliography Discussion Introduction The widespread adoption of containe... cloud containers docker kubernetes
Infosec for All, Shawn Bowman Protecting Your Customers and Your Business TOC Introduction Understanding PCI DSS Steps for Very Small Businesses Additional Tips Conclusion Bibliography Discussion Introduction Accepting credit card payments is a near-necessity for businesses... DSS PCI credit card payment smb
Infosec for All, Shawn Bowman HIPAA Compliance for Very Small Businesses TOC Introduction Understanding HIPAA for Small Businesses Key Steps for Very Small Businesses Additional Considerations for Small Businesses The Benefits of HIPAA Compliance Bibliography Discussion In... hippa smb
Infosec for All, Shawn Bowman NIST Cybersecurity Framework TOC Introduction What is the NIST Cybersecurity Framework? Why Should Very Small Businesses Care? Implementing the NIST CSF for Very Small Businesses Practical Steps for VSBs Conclusion Bibliography D... NIST framework smb
Infosec for All, Shawn Bowman SIEM and SOAR TOC Introduction SIEM: The Foundation of Threat Detection SOAR: Streamlining and Automating Security Operations Closely Related Software Types How SIEM, SOAR, and Related Technologies Protect Against ... detection logs tools
Infosec for All, Shawn Bowman Social Engineering TOC Introduction Common Social Engineering Tactics The Devastating Impact of Social Engineering How to Protect Yourself and Your Organization Conclusion Bibliography Discussion Introduction Technical ... attacks social
Infosec for All, Shawn Bowman SQL Injection Vulnerabilities TOC Introduction Understanding SQL Injection Types of SQL Injection Consequences of SQL Injection Defensive Strategies Conclusion Bibliography Discussion Introduction SQL injection (SQLi) remains a pe... attacks coding
Infosec for All, Shawn Bowman Cross-Site Scripting TOC Introduction Types of Cross-Site Scripting Understanding XSS Attacks Defense Strategies Against XSS Conclusion Bibliography Discussion Introduction Cross-site scripting (XSS), a persistent threat ... attacks coding vulnerabilities
Infosec for All, Shawn Bowman Brute Force Attacks TOC Introduction Understanding Brute Force Vulnerabilities The Impact of Brute Force Attacks Essential Strategies for Protection Against Brute Force Attacks Conclusion Bibliography Discussion Introduc... attacks brute force password