{
e
lysium
s
ecurity}
Cyber Protection & Response
About Us
Clients
Services
News
Crypto
Download
MU.SCL
News Links
All
Challenges
Conferences
Cryptography
Guides
Hacking
IDS
Misc
Security
RSS Feeds
Guides News
How to secure your mobile phone and check for spyware?
A Generic Incident Playbook
Free Cyber Incident Playbooks on GitHub
2019 CYBER SECURITY TRENDS REPORT OVERVIEW
PHISHING PROTECTION FRAMEWORK
HOW TO CHOOSE MICROSOFT 365 SECURITY PLANS AND ADD-ONS: E3, E5, EMS E3, EMS E5, 365 E3, 365 E5
Cyber Security Planning - A simple 6 Steps Approach
How to build an efficient Anti-Phishing Framework?
How to build a Red Team and Why?
One more update to the Security Onion Guide
Updated Security Onion Guide
How to setup PIWIK to track visitors' downloads
How to setup Security Onion on a home network with Splunk, email alerts and some basic tuning
Fix for compiling VMwaretools 9.9.2 on kernel 3_18+
Apple Security in the Enterprise
A story about Password: The Wrong Formula
New Dropbox Issues and a work around
SANS Ondemand Training course: A few Tips
DoD Windows OS Security guides