Main Menu
Login
CONTRAST:
Home
Contact Us
CONTRAST:
Home
Contact Us
RSS
New Pluralsight course: Ethical Hacking, Denial of Service
21 March 2016
I’ve just launched my latest Pluralsight course titled Ethical Hacking, Denial of Service but before I explain what’s in it, let’s kick off with some trivia: DDoS attacks have increased massively in...
View More
Understanding Cross Site Request Forgery
Mechanics of a CSRF Attack
20 March 2016
Cross site request forgery is one of those attacks which remains enormously effective yet is frequently misunderstood. I’ve been running a bunch of security workshops for web developers around the globe...
View More
Microsoft Regional Director
2 March 2016
This was not what I was expecting earlier this week: I am delighted to welcome you to the Microsoft Regional Director program! More specifically, the nomination I received some weeks back was not what I expected...
View More
Meaningful Use Stage 2 & HIPAA
The Relationship between HIPAA and Meaningful Use Privacy & Security
21 September 2015
The Health Insurance Portability and Accountability Act (HIPAA) Rules provide federal protections for patient health information held by Covered Entities (CEs) and Business Associates (BAs) and give patients an array...
View More
1
2
3
Back to top