Tag Archives: Recommended

[Recommended Reading] Shantanu NARAYEN

Source: Shantanu NARAYEN Wikipedia

Shantanu Narayen (born 27 May 1963) is an Indian American business executive and the CEO of Adobe Systems. Prior to this, he was the president and chief operating officer since 2005. He is also the president of the board of the Adobe Foundation. Read more…

Image source

Advertisements

Leave a comment

Filed under General, Leadership, Recommendations

[Recommended Reading] Cross-site request forgery

Source: Cross-site request forgery Wikipedia

Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF, is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the website trusts. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user’s browser.

Image Source

Leave a comment

Filed under General, InfoSec, Recommendations

[Recommended Reading] Mean time to repair

Source: MTTR Wikipedia

Mean Time To Repair (MTTR) is a basic measure of the maintainability of repairable items. It represents the average time required to repair a failed component or device. Expressed mathematically, it is the total corrective maintenance time for failures divided by the total number of corrective maintenance actions for failures during a given period of time. It generally does not include lead time for parts not readily available or other Administrative or Logistic Downtime (ALDT).

Image source

Leave a comment

Filed under Recommendations

[Recommended] iSECnews

Check out this awesome resource: iSECnews 

Source: isec.news

Leave a comment

Filed under Articles, InfoSec, Recommendations

[Recommended Reading] Shamir’s Secret Sharing

Source: Shamir’s Secret Sharing 

“Shamir’s Secret Sharing is an algorithm in cryptography created by Adi Shamir. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part, where some of the parts or all of them are needed in order to reconstruct the secret.”

Leave a comment

Filed under InfoSec, Recommendations, Uncategorized