There are currently, 416 guest(s) and 11 member(s) that are online.
You are Anonymous user. You can register for free by clicking here
CCCure CISSP Boot Camp in Zurich, Switzerland. 19-23 October 2015
Posted by cdupuis on Thursday, 17 September 2015 @ 20:47:48 CEST (2253 reads)
Anonymous writes "
Now is your chance to become certified as a CISSP®. Isometric in association with CCCure is bringing you a local boot camp delivered by Clement Dupuis for the first time ever in Zurich, Switzerland."
Clement is the owner and founder of the CCCure Family of Portals. Clement has delivered more CISSP® boot camp than any other instructors. He has an amazing passing rate of more then 90% for first time exam taker. Get trained by the Master of the CISSP® certification.
For more information contact [email protected] or call us at: +41 (78) 8665 078
See our website at: http://www.isometric.ch/
CISSP CBT Tutorial for the BCP and DRP domain of the CBK
Posted by cdupuis on Friday, 08 August 2014 @ 21:04:41 CEST (3310 reads)
Anonymous writes "
The CCCure Learning Portal is our new Learning Portal and it will eventually replaced CCCure.org. The CCCure.Org has lots of legacy, it has some spammer posting within articles, and it is due for retirement. Over the next months we will migrate the relevant content of CCCure.Org to CCCure.Training. So far I have developed 38 Hours of thorough Computer Based Tutorial and I will continue over the next week as well.
You can visit the new site at: The CCCure Learning Porta
Good day to all,
I have never read as many NIST standards, books, and documents as I did over the past two weeks. I am on a roll and well on my way to cover all of the domains of the CBK. The most important ones are mostly done. The next one on the list will be Security Architecture and Design.
I am pleased to say that I have just uploaded my BCP and DRP CBT tutorial to the site a few minutes ago. It is a complete CBT that covers 100% of all exam objectives. You have 2 hours and 6 minutes of thorough coverage.
This is one of the TOP 5 Domains for you exam. This is the a domain that will make you pass or fail the exam. It counts for about 12% of the whole exam. You must master this domain.
With this domain completed, we now have a total of more than 38 hours of tutorial, covering 5 of the most important domains. All the tutorials are developed by CCCure/Clement the owner and founder of CCCure. They are all available on on the web site to all of our Silver and Gold members.
If you wish to upgrade your account from Standard to either Gold or Silver it is very easy. Simply visit http://cccure.training/index.php and login with your account. After you are logged in visit the link below and you will see our subscription options:
FOR OUR GOLD AND SILVER MEMBERS
The tutorials are available to Gold and Siver members at:
The MP3 files were uploaded as well and you can download them to listen while mobile on the road. You will find the MP3 files at:
Please take a minute to send me some feedback. I always appreciate to hear from members.
What's New in the Retina 4.5 Release (Webinar)
Posted by cdupuis on Friday, 31 May 2013 @ 08:26:20 CEST (2446 reads)
Wed, Jun 5, 2013 1:00 PM - 2:00 PM EDT Webinar Registration
Retina is the only vulnerability management platform designed from the ground up to provide IT security for professionals with context-aware vulnerability assessment and risk analysis. Retina’s results-oriented architecture works with users to proactively identify security exposures, analyze business impact, and plan and conduct remediation across network, web, mobile, cloud and virtual infrastructure. Join our team and see what's coming up in our latest release. In this 60 minute webinar we will cover:
• Dynamic Auditing Capability (Vulnerability Smart Groups)
• Enhanced Data Discovery
• New Reporting
• Policy Deployment through Retina CS
• Session Monitoring
• File Integrity Monitoring
With the most powerful reporting and analytic capabilities in its class, Retina makes it easy to make smart decisions, effectively communicate risk, and report vulnerability management progress to executives and compliance auditors. Built to scale and perform in large environments, Retina provides centralized command and control over assessments of disparate and heterogeneous infrastructure. Over 10,000 customers worldwide rely on Retina to enable visible, measurable and actionable vulnerability management across their organizations.
REGISTER NOW AT: https://www1.gotomeeting.com/register/987964985
Webinar: CompTIA Advanced Security Professional (CASP)
Posted by cdupuis on Monday, 13 May 2013 @ 15:47:54 CEST (2732 reads)
Here is a webcast you don't want to miss.
My friend Eric Conrad will be doing a webcast tomorrow on the new CASP Certification from CompTIA.
Visit the link below to register:
On the exciting side, The CASP was added to DoD 8570 for the following roles:
IAT level III
IAM II, and
IASAE level I and II.
You can see the updated 8570 list of approved certifications at:
Here is the latest list of approved certs on the graphic below:
DoD Approved 8570 Baseline Certifications
Become a Cyber Warrior and get an iPad mini
Posted by cdupuis on Wednesday, 19 December 2012 @ 09:07:51 CET (2091 reads)
Anonymous writes "
Boost your skills and career marketability with an award winning boot camp from SecureNinja and for a limited time receive Apple's new iPad mini! It's bigger than an iPhone, but smaller than an iPad—it's iPad mini. With a 7.9-inch screen, this device shouldn't give you any visibility issues, but it also won't be a burden in your hand.
CISSP Boot Camp Abu Dhabi, UAE and Doha, Qatar
Posted by cdupuis on Thursday, 25 October 2012 @ 22:47:32 CEST (2133 reads)
Anonymous writes "
The Abu Dhabi and Doha classes are coming up very soon
There are only a few weeks before the Abu Dhabi, UAE and Doha, Qatar CISSP® boot camps led by Clement Dupuis. There are still a few seats left. Our classes have small number of students which allow for great interaction with your instructor and one on one discussions. Clement is always available before, during, and after class.
Our curriculum is updated with the latest Common Body of Knowledge (CBK®) content.
You get access to the CCCure Quiz engine
and the CISSP
® File Share
Every student will be given access to the CCCure Quiz Engine for 180 Days. The CCCure Quizzes will give you a very unique advantage, It is the most comprehensive database of questions that you can find to prepare and pass the exam on the first trial. Students will be given access as soon as they register for the class.
Every student will also get acces to Clement's private CISSP® Prep file share with practice quizzes, exam cram, videos, scenario based questions, tutorials on topics of the CBK®, and the full boot camp recorded for your convenience. You can listen to any of the domain after the class to further learn each of them. You get access to the file share and the recordings for 180 Days. Student will get the URL for the file share on the first day of class.
Clement is the maintainer of www.cccure.org which is known as the #1 CISSP® portal on the planet. Over 135,000 members have used Clement`s resources to prepare for their security exams. Clement brings over 35 years of IT and Security experience into the classroom. There is noboby that knows the CISSP® CBK® better than Clement who has delivered this boot camp over 200 times in more than 25 countries over the past 13 years. He's really a master of the CISSP® certification.
Our amazing passing rate of more then 90% of our students on the first trial speak for itself.
You can visit the Quiz Engine at: https://www.freepracticetests.org/quiz/index.php?page=home
You can visit the OISSG website at: http://www.oissg.org/
Pen Tests Evolved: The Advanced Threat Cycle
Posted by cdupuis on Thursday, 09 February 2012 @ 10:40:05 CET (2840 reads)
Anonymous writes "
You're Invited: Penetration Testing Webcast
Date: Tuesday, February 14, 2012
Time: 2pm US Eastern Time (GMT -4:00, New York)
Host: Dave Shackleford, Voodoo Security
*** A recording of the webcast will be sent to everyone who registers, so be sure to sign up even if you can’t make the live session. ***
Over the last few years, we've heard a lot of discussion in the security community about "advanced threats". Whether persistent or not, the attackers are using a vast arsenal of techniques to compromise systems and steal data, some newer and more cutting-edge, while others are more tried and true. No matter your opinion on the "APT", the attacks are happening and organizations are losing data left and right. How can you determine your susceptibility to these attacks? There's no one answer to this, but proactive security assessments that emulate some of the attackers' methods can help you to pinpoint your weak spots.
During this presentation, Dave Shackleford will cover:
The advanced threat cycle, and what attack techniques and tools are seen most frequently
What most internal pen testing teams are doing today, and why it may not be adequate for today's threat landscape
How internal pen testing teams can switch up their normal testing regimens to better represent advanced threats to organizations
Tips for how to prevent and detect advanced malware as part of your assessment program
Click here to register
*** A recording of the webcast will be sent to everyone who registers, so be sure to sign up even if you can’t make the live session. ***
Security Kaizen Magazine Issue 4 is released
Posted by cdupuis on Friday, 03 February 2012 @ 13:58:28 CET (2838 reads)
Security Kaizen Magazine Yearly issue.
An issue that you shouldn't miss
In Egypt : 30 % discount Coupon for EC council Courses inside the Printed Copy.
Printed Copy Request
Coming Soon : Arabic Version
LACSEC 2012, May 6-11, 2012, Quito, Ecuador
Posted by cdupuis on Monday, 16 January 2012 @ 11:43:47 CET (2864 reads)
***************************************** CALL FOR PRESENTATIONS
***************************************** LACSEC 2012
7th Network Security Event for Latin America and the Caribbean
May 6-11, 2012, Quito, Ecuador http://lacnic.net/en/eventos/lacnicxvii/
) is the international organization based in (Uruguay) that is responsible for administrating IP address space, Reverse Resolution, Autonomous System Numbers and other resources for the region of Latin America and the Caribbean on behalf of the Internet
The 7th Network Security Event for Latin America and the Caribbean will be held in Quito, Ecuador, within the framework of LACNIC's seventeenth annual meeting (LACNIC XVII). This is a public call for presentations for that event.
The topics of interest include, but are not limited to, the following:
* Honeypots, network monitoring and situational awareness tools in general.
* Fighting spam, particularly spam from origin (SPF, DKIM and related technologies. Email reputation)
* Fighting phishing and pharming
* Fighting malware
* Internet protocol security
* IPv6 security
* Security of network infrastructure services (DNS, NTP, etc.)
* Web security
* DoS/DDoS response and mitigation, botnets
* Authentication and access control
* Security in the cloud
* Protection of critical infrastructure
* Security in mobile systems
* Computer security incident response teams (CSIRTs): creation, management, experiences
* Security in corporate environments, compliance and auditing, return on security investments
* Security management (procedures, operational logs, records, etc.)
* Risk management in Information Security
* Computer forensics
* Protection of privacy
* Legal aspects relating to computer security
Guidelines for Presenting Proposals
Proposals for the 7th Network Security Event for Latin America and the Caribbean (LACSEC 2012) must be presented taking into account the
* The proposal may consist of a paper, or (alternatively) an Extended Abstract plus a draft version of the slides to be used for the presentation.
* Proposals may be presented in English, Portuguese or Spanish.
* Proposals must be submitted in Portable Document Format (PDF)
* Submissions must be created directly using a word processing system (scanned articles will not be accepted)
* Presentations may not be longer than 30 minutes.
Submitting a Proposal
Those interested in presenting at LACSEC 2012 must send the following information to <[email protected]
> within the deadlines set
* Full title of the presentation
* A paper or, alternatively, an Extended abstract and a draft of the slides to eb used for the presentation. The paper should not be longer than 10 pages. The extended abstract should not contain more than one thousand (1000) words. The Evaluation Committee may, at its sole discretion, request additional or omplementary information.
* Full name, email address and organization with which the author (or authors) of the submission is affiliated
For more information, please don't hesitate to contact the Evaluation Committee at <[email protected]
The Evaluation Committee that has been created for this purpose will evaluate proposals based on the following basic criteria:
* Technical quality
LACNIC will cover the registration fee for those authors whose presentations are accepted. Speaker travel and accommodation expenses, however, will not be covered.
Presenters who require financial assistance to attend the event may apply for the LACNIC Financial Assistance Program. Please read the corresponding instructions <http://lacnic.net/en/eventos/lacnicxvii/
>. In no case does applying for the sponsorship program guarantee that financial assistance will be granted. For more information please contact LACNIC staff at <[email protected]
* Deadline for proposal submission: February 15th, 2012
* Notification of acceptance: February 27th, 2012
* Deadline for submitting the final version the presentation: May 6th, 2012
7th Network Security Event for Latin America and the Caribbean (LACSEC 2012)
Fernando Gont (SI6 Networks/UTN-FRH, Argentina)
Iván Arce (Argentina)
Lorena Ferreyro (Consultora Independiente, Argentina)
Javier Liendo (Cisco, Mexico)
Carlos Martinez Cagnazzo (LACNIC, Uruguay)
Reinaldo Mayol (Universidad Pontificia Bolivariana, Colombia)
Domingo Montanaro (iSight Partners, Brazil)
Jose Miguel Parrella Romero (Debian developer, Ecuador)
Patricia Prandini (ADACSI, Argentina)
Javier Romero (JaCkSecurity, Peru)
Arturo Servin (LACNIC, Uruguay)
Liliana V. Solha (CAIS/RNP, Brazil)
Leonardo Vidal (ISOC Capitulo Uruguay, Uruguay)
e-mail: [email protected]
Live Online CISSP Boot Camp at 1/2 the price of our Live Classroom Boot Camp
Posted by cdupuis on Wednesday, 21 December 2011 @ 20:55:15 CET (2460 reads)
Anonymous writes "
|CISSP ® LIVE OnLine
- Accessible from any Location
- No Daily Commute in traffic
- No Airfare Fees
- No Hotel fees
- Same quality of delivery as a brick and mortar class
- All sessions are recorded
- Listen as many times as you wish
- Do it from the comfort of your home
- Let Clement guide you to success (pre-present-post mentoring)
- 5 Day CISSP Immersion Training
- Award Winning Proprietary Curriculum
- Highest CISSP Exam Pass Rates
- Day, Evening,Weekend & Live Online classes to meet your busy schedule
- Pre/Present/Post Class Paid Account to CCCure Quiz Engine (World's best CISSP 2000+ exam questions)
- Exclusive CISSP Scenario Based Exam Questions
- Get DoD 8570.1-M CISSP Compliant
- WIA (Workforce Investment Act) Approved
- Veterans Benefits & GI Bill Approved - Welcome Military!
- Option to resit Live Online CISSP class for up to one (1) year
Clement Dupuis, CD
Your Live Online mentor Before, During & After class
Get Live Online Instructor Led Learning for 1/2 the price of our Classroom Based Boot Camps.
Class is filling fast. Call Enrique to secure your seat today.
Phone: +1 703 535 8600 x16
Mobile: +1 305 467 7436
901 North Pitt St. Suite 105
Alexandria, VA 22314
Email : [email protected]
Call for Papers -YSTS 6 - Security Conference, Brazil
Posted by cdupuis on Monday, 12 December 2011 @ 18:27:03 CET (3350 reads)
Anonymous writes "
YSTS 6th Edition"
Sao Paulo, Brazil
May 7th, 2012
Call for Papers Opens: December 10th 2012
Call for Papers Close: February 26th 2012
After 5 very successful editions we are off to the 6th edition of the
you Sh0t the Sheriff security conference and we are sending this off
so you send us the coolest stuff you've been working on.
The conference will happening on May, 7th, 2012 in Sao Paulo, Brazil.
This is your chance to speak about that cool research you’ve been
working on, to those whom matter in the Brazilian Information Security
ABOUT THE CONFERENCE
you Sh0t the Sheriff is a very unique, one-day, event dedicated to
bringing cutting edge talks to the top-notch professionals of the
Information Security Community in Brazil.
The conference’s main goal is to bring the attendees to the most
up-to-date state of the information security world by mixing
professionals and topics from different Infosec segments of the
yStS is a very exclusive, mostly invite-only security con. Getting a
talk accepted, will, not only get you to the event, but after you
successfully present your talk, you will receive a challenge-coin that
guarantees your entry to yStS for as long as the conference exists.
Due to the great success of the previous years' editions, yes, we're
keeping the same
* YSTS 6 will be held at an almost secret location only announced to whom
it may concern a couple of weeks before the con
* the venue will be, most likely, a very cool club or a bar
(seriously, see pictures)
* appropriate environment to network with great security folks from
Brazil and abroad
* since it’s a 1 day con with tons of talks, we provide to everyone
coffee, lunch and booze
Anything Information Security related is interesting for the
conference, although we strictly do not accept commercial/
product-related pitches. Keep in mind though, this is a one-day
conference, we receive a lot of submissions, so please do your best in
sending new / coolest research.
Just in case you need some ideas, some of the topics in security that
could be interesting to us:
* Mobile Devices
* Social Netwoking Threats
* Embedded Systems
* Social Networking and Client-Side Techniques
* Red Team Techniques
* Inside Jobs Detection/ Techniques
* Operating Systems
* Career & Management topics
* (cool and useful) Information Security Policies
* Privacy in the Digital World
* Messing with Network Protocols
* 802.11 Wireless and any RF related stuff for that matter
* Incident Response Stories and Policies
* Information Warfare
* Malware/ Botnets
* DDoS Evolution or Stories
* Secure Programming
* Hacker Culture
* Application Security
* DataBase Security
* "the" Cloud
* System Weaknesses
* Infrastructure and Critical Systems
* Reverse Engineering
* Social Reverse Engineering
* Reversing Social Engineering
* Caipirinha and Feijoada Hacks
* and everything else information security related that our attendees
would enjoy, the coolest/ different/ most creative submissions win,
keep that in mind!
We do like shorter talks, so, please submit your talks and remember
they must be 30 minutes long. (yes, we do strictly enforce that)
We’re also opened to some 15-minute talks, some of the smart people
around might not need 30 minutes to deliver a message, or it might be
a project that has been just kicked-off.
15 minutes might be your thing and that's nothing to be ashamed about.
you Sh0t the Sheriff is the perfect conference to release your new
projects, other people have released very cool research before they
presented it at the bigger cons.
And yes, we do prefer new hot-topics and, yes, "first-time" speakers
are more than welcome.
If you got good stuff to speak about, that's all that matters.
(and, that applies only to the 30 minute-long talks)
* USD 1,000.00 to help covering travel expenses for international speakers
* Breakfast, lunch and dinner during conference
* Pre-and-post-conference official party (and the unofficial ones as well)
* Auditing products in traditional Brazilian barbecue restaurants
* Life-time free admission for all future yStS conferences (yes, if you 've
spoken before at yStS, you have your free-entry guaranteed, just buy us a
beer, ohh, wait, it's free anyways, isn't it?)
CFP IMPORTANT INFO (aka: what do we need from you)
Each paper submission must include the following information:
* Abstract/ Presentation Title
* Summary or abstract for your presentation
* Your Name, company/title, address, email and phone/contact number
* Short biography and qualification
* Speaking experience
* Do you need or have a visa to come to Brasil?
* is it a 30 minute or a 15 minute talk?
* Technical requirements (others than LCD Projector)
* Other publications or conferences where this material has been or
will be published/submitted.
VERY IMPORTANT DATES
Final CFP Submission - February 26th, 2012
Final Notification of Acceptance - March 26th, 2012
Final Material Submission for accepted presentations - May 3rd, 2012
All submissions must be sent via email, in text format only to: cfp/at/ysts.org
IMPORTANT CONTACT INFORMATION
Paper Submissions: cfp/at/ysts.org
General Inquiries: b0ard/at/ysts.org
Sponsorship Inquiries: sponsors/at/ysts.org
YSTS 5 video clip http://tinyurl.com/ysts5clip
pictures of last con http://tinnyurl.com/ysts5pix1
video channel http://ysts.blip.tv/
official twitter hashtag #ystscon
We hope to see you there!
Luiz Eduardo & Nelson Murilo & Willian Caprino
SecureNinja declared co-winner of SC Magazine 2012 Awards
Posted by cdupuis on Wednesday, 09 November 2011 @ 08:37:57 CET (2381 reads)
Anonymous writes "
Good day Ninja’s,
We are proud to announce that Secure Ninja has been declared co-winner of SC Magazine 2012 Awards for Best Professional Information Security Training Program.
That is the 2nd award within a 1 month period for Secure Ninja!
At Hacker Halted a week ago we won the prize for Best Newcomer ATC of the year.
We would like to thank all our students, instructors, partners, and supporters who made this possible.
We look forward to continue serving you throughout 2012 with the same commitment to quality of delivery and content.
Best Professional Information Security Training Program
Best Newcomer Authorized Training Center (ATC) of the year from EC-Council
ClubHack Magazine Issue 21- October 2011 has been Released
Posted by cdupuis on Monday, 10 October 2011 @ 14:11:52 CEST (3389 reads)
Here are with the Issue-21, October 2011 of ClubHack Magazine.
This issue covers following articles:-
0x00 Tech Gyan - Low Profile Botnets
0x01 Tool Gyan - Demystifying the Android Malware
0x02 Mom's Guide - MALDROID
0x03 Legal Gyan - Law relating to Child Pornography in India
0x04 Matriux Vibhag - WEBSECURIFY
0x05 Poster - Bhag Bhag PC Bose
Check http://chmag.in/ for articles.
PDF version can be download from:- http://chmag.in/issue/oct2011.pdf
Hope you'll enjoy the magazine.
Send us your feedback and articles at [email protected]
PenTest Magazine October Issue is out!
Posted by cdupuis on Friday, 07 October 2011 @ 09:43:09 CEST (3005 reads)
October Issue is out! Buy 1 year PenTest Subscription and Recieve PenTest for 2 Years! Get 50% Discount on Full HISPI Library Access and More!
|Read October issue! Fuzzing for Pentesters
Protocol fuzzing has been a popular technique for bug discovery with a number of tools, books and papers describing the benefits and drawbacks. Although typically used for bug discovery in a lab environment, there are opportunities to use fuzzing in a penetration testing role too.
by JOSHUA WRIGHT
Read more in October issue of PenTest Magazine!
Download October Issue Now, or if somehow you are not subscribed yet, do it now!, or if you need to get convinced for subscribing, see the free teaser!
- Web Application Fuzzing and Positive Validation by Prasanna Kanagasabai & Kartikeya Puri, where authors gives us some essential knowledge about Application Web Fuzzing.
- Fuzzing in a Penetration Test by Joshua Wright - get convinced by Josh, that fuzzing can be used in a wide range of ways.
- Fuzzing as the Art for Security Testing By Aniket Kulkarni. Author's first flavor, which focuses on knowing Fuzzing conceptually and explaining fuzzing in definitions, history and what are Fuzzers.
- Introduction to exploit automation with Pmcma by Jonathan Brossard, who made a serious efforts to provide you all the details concerning this tool, that you might need.
- Common Database Issuses to Look at in Penetration Testing, by Srinivasan Sundara Rajan, is the article, where author tells you about the things common for Penetration Testing and Database branches.
- The Art (and Necessity) of the On-Site Social Engineering Audit by Shane Macdougall, where Shane focuses on Social Engineering in general, but he also speaks about On-Site Attacs.
- Interview with David Vaughn by Aby Rao, where he talks with David about his career, and shares with us with some of the David professional experiences.
|Buy 1 Year PenTest Subscription and Recieve PenTest for 2 Years!
Buy 1 Year PenTest Subscription and Recieve PenTest for 2 Years!
Not yet subscribed to PenTest Magazine? Don't hesitate and buy annual subscription yet today! If you will buy PenTest annual subscription until 12:00 am (GMT +1) on the 14th of October, you will get next year subscription FOR FREE
PAY FOR ONE - GET TWO! 48 instead of 24 PenTest issues. Sounds good?
Don't wait, the offer is valid until 12:00 am (GMT +1) on 14.10.2011!
CLICK HERE TO SUBSCRIBE
|Please spread the word about PenTest.
Maciej Kozuszek & PenTest team
Takedowncon 2 - December 2-7 in Las Vegas
Posted by cdupuis on Tuesday, 04 October 2011 @ 09:38:34 CEST (2306 reads)
Takedowncon 2, December 2-7 in Las Vegas will focus on mobile & wireless security.
Takedowncon - organized by EC-Council - is a new series of topic-specific IT security events that takes deep technical dives into the hottest security segments.
The format consists of hands-on training, a two-day conference and exhibits.
TDC is designed for researchers, engineers and technical managers.
Register early foe the best rates.
See details at: www.takedowncon.com
There isn't content right now for this block.
Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.
Big Story of Today
There isn't a Biggest Story for Today, yet.
|Saturday, August 13|
|·|| Issue19 of ClubHack Mag for the month of August 2011 has been released |
|Friday, July 08|
|·|| Heuristic Methods versus Automated Scanners FREE article from PenTest Magazine |
|Tuesday, July 05|
|·|| Physical goes first! PenTest Magazine July issue has been released |
|Thursday, June 30|
|·|| Cloud Penetration Testing |
|Saturday, June 25|
|·|| Hacker Halted USA, October 21-27 in Miami |
|Thursday, June 09|
|·|| Club Hack magazine June Edition on Wireless Security is released |
|Wednesday, June 01|
|·|| PenTest Magazine June Issue and Enterprise IT Security Mag for free |
|Wednesday, May 18|
|·|| PenTest Magazine June Issue |
|Sunday, May 15|
|·|| Club Hack magazine May Issue on Browser Security |
|Wednesday, May 11|
|·|| PenTest Magazine May Issue is Ready! |
|Friday, May 06|
|·|| New Enterprise IT Security Magazine has been released |
|Friday, April 22|
|·|| PenTest Magazine is Launched – Download Free Teaser Issue |
|Monday, April 04|
|·|| HITBSecConf2011 - Malaysia Call for Papers Now Open |
|Thursday, March 17|
|·|| CarolinaCon-7, Raleigh, NC, April 29th till 1st of May 2011 |
|Friday, January 21|
|·|| THOTCON 0x2, tChicago, IL on Friday, April 15th, 2011 |