860 Results for:PDF

  • Sort by: 

Burp Suite Tutorial PDF compendium: WebApp tester’s ready reference

09 May 2012

Our Burp Suite tutorial PDF compendium is a collection of our Burp Suite guides in PDF format made available to you for free offline reference. Read More

How to avoid internet black holes for the network

By Venus Kohli 21 Mar 2024

Black holes in the network disrupt connectivity and compromise data integrity. Network monitoring, team collaboration and routing optimization help minimize the negative effects. Read More

6 SharePoint Syntex use cases

By Christine Campbell 13 Mar 2023

File discovery is one of the most popular use cases for SharePoint Syntex. But how else can you use it? Here, see how real-world teams have begun to use this tool. Read More

Can an HTML5 document with a digital signature be authenticated?

By Michael Cobb 25 Oct 2016

A digital signature on an HTML5 document cannot be authenticated the same way a PDF can. Expert Michael Cobb explains how enterprises should address this issue. Read More

How DocuSign is extending its capabilities beyond e-signatures

By Aaron Tan 13 Sep 2023

DocuSign is harnessing large language models to help individuals make sense of agreements and employing AI-based biometrics to verify the identity of signers, as part of its broader efforts to expand its ... Read More

Snake Keylogger climbing malware charts, says Check Point

By Alex Scroxton 10 Jun 2022

Cyber criminals behind Snake Keylogger campaigns have been switching up their tactics in the past few weeks, say researchers Read More

3 Keycloak authorization strategies to secure app access

By Kyle Johnson, Packt Publishing 18 Apr 2024

Keycloak, an open source IAM tool, offers authorization methods, including RBAC, GBAC and OAuth 2.0, that limit what users can access. Read More

Dozens of surveillance companies are supplying spyware to governments, says Google

By Bill Goodwin 07 Feb 2024

Google’s Threat Analysis Group has identified 40 companies involved in selling and supplying security exploits and spyware services to governments Read More

How the macOS Security Compliance Project can help IT

By Robert Sheldon 16 Jan 2024

It can be difficult for Apple admins to adapt to every new OS release and the respective compliance changes. That's where the macOS Security Compliance Project comes into play. Read More

Internal documents leaked as Rhysida claims responsibility for British Library ransomware attack

By Bill Goodwin 21 Nov 2023

Ransomware group Rhysida threatens to sell documents stolen from the British Library to the highest bidder Read More