all InfoSec news
Topic: designers
From Pixels to People: Redefining UX for Social Impact
1 day, 9 hours ago |
dev.to
What modern authentication technology do big consumer apps uses?
1 week, 5 days ago |
dev.to
Cryptanalytic Audit of the XHash Sponge Function and its Components
2 weeks, 5 days ago |
www.iacr.org
Tim Byrne’s Vintage Industrial
3 months, 2 weeks ago |
loudtreemedia.com
Cryptanalysis of QARMAv2
5 months, 2 weeks ago |
www.iacr.org
UK cyber agency signs its first IETF RFC
5 months, 3 weeks ago |
www.itnews.com.au
Let's Settle This in the Cyber Range | Host: Ed Skoudis | October 24, 2023
6 months, 3 weeks ago |
www.youtube.com
Threshold Implementations with Non-Uniform Inputs
7 months, 1 week ago |
www.iacr.org
Cybercriminals target graphic designers with GPU miners
8 months, 1 week ago |
malware.news
Give your Microsoft Sentinel incidents some style
10 months, 1 week ago |
blog.reversinglabs.com
Abra-QR-dabra: Watch Passwordless Mobile Auth Magically Appear
11 months, 2 weeks ago |
dev.to
Algebraic cryptanalysis of POSEIDON
1 year, 1 month ago |
www.iacr.org
SAFE: Sponge API for Field Elements
1 year, 1 month ago |
www.iacr.org
A New Generic Fault Resistant Masking Scheme using Error-Correcting Codes
1 year, 3 months ago |
www.iacr.org
An Attack on the LILLE Stream Cipher
1 year, 3 months ago |
www.iacr.org
From Pixels to People: Redefining UX for Social Impact
1 day, 9 hours ago |
dev.to
Items published with this topic over the last 90 days.
Latest
From Pixels to People: Redefining UX for Social Impact
1 day, 9 hours ago |
dev.to
What modern authentication technology do big consumer apps uses?
1 week, 5 days ago |
dev.to
Cryptanalytic Audit of the XHash Sponge Function and its Components
2 weeks, 5 days ago |
www.iacr.org
Tim Byrne’s Vintage Industrial
3 months, 2 weeks ago |
loudtreemedia.com
Cryptanalysis of QARMAv2
5 months, 2 weeks ago |
www.iacr.org
UK cyber agency signs its first IETF RFC
5 months, 3 weeks ago |
www.itnews.com.au
Let's Settle This in the Cyber Range | Host: Ed Skoudis | October 24, 2023
6 months, 3 weeks ago |
www.youtube.com
Threshold Implementations with Non-Uniform Inputs
7 months, 1 week ago |
www.iacr.org
Cybercriminals target graphic designers with GPU miners
8 months, 1 week ago |
malware.news
Give your Microsoft Sentinel incidents some style
10 months, 1 week ago |
blog.reversinglabs.com
Abra-QR-dabra: Watch Passwordless Mobile Auth Magically Appear
11 months, 2 weeks ago |
dev.to
Algebraic cryptanalysis of POSEIDON
1 year, 1 month ago |
www.iacr.org
SAFE: Sponge API for Field Elements
1 year, 1 month ago |
www.iacr.org
A New Generic Fault Resistant Masking Scheme using Error-Correcting Codes
1 year, 3 months ago |
www.iacr.org
An Attack on the LILLE Stream Cipher
1 year, 3 months ago |
www.iacr.org
Topic trend (last 90 days)
Top (last 7 days)
From Pixels to People: Redefining UX for Social Impact
1 day, 9 hours ago |
dev.to
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Security Operations Manager-West Coast
@ The Walt Disney Company | USA - CA - 2500 Broadway Street
Vulnerability Analyst - Remote (WFH)
@ Cognitive Medical Systems | Phoenix, AZ, US | Oak Ridge, TN, US | Austin, TX, US | Oregon, US | Austin, TX, US
Senior Mainframe Security Administrator
@ Danske Bank | Copenhagen V, Denmark