Can SOAR Platforms Be Used in Penetration Testing?
|sponsored post| Can SOAR Platforms Be Used in Penetration Testing? by Jonathan Zhang When we hear about security orchestration, automation, …
Read More5 Things Every CEO Should Know About Cybersecurity
5 Things Every CEO Should Know About Cybersecurity by Michael Gorman In the past, many chief executive officers of companies …
Read MorePentest: Scapy Cheat Sheet by SANS Institute
Scapy Cheat Sheet Pocket Reference Guide Ver. 0.2 by SANS Institute The content has been originally published at: https://pen-testing.sans.org/blog/2016/04/05/scapy-cheat-sheet-from-sans-sec560/?reply-to-comment=8562
Read MoreThe 5 Most Strategic Ways to Protect Your Biggest Assets in the New Year and Beyond
The 5 Most Strategic Ways to Protect Your Biggest Assets in the New Year and Beyond by Michael F D …
Read MoreThe Reality of Cybersecurity Awareness Programs and Their Shortcomings
The Reality of Cybersecurity Awareness Programs and Their Shortcomings by Michael Dehoyos Companies have to focus on the culture and …
Read MoreRed Teaming @ 10000 Feet
Red Teaming @ 10000 Feet by David Evenden There are many articles/books that are pro-Red Teaming, but I haven't seen …
Read MoreWhat is the Domain Name System (DNS)?
What is the Domain Name System (DNS)? by Gregory V. Chapman Domain Name System (DNS) is a naming system used …
Read MoreMuch Ado About SOAR, What Is It Exactly?
|sponsored post| Much Ado About SOAR, What Is It Exactly? by Jonathan Zhang Several security operations centers (SOCs) and businesses …
Read More7 Cybersecurity Blunders in Big Data
7 Cybersecurity Blunders in Big Data by Sourodip Biswas It wouldn’t be an exaggeration to mention that we are entering …
Read MoreMnemonic Security, Inc. shortlisted for an FDATA Open Finance Award
Mnemonic Security, Inc. shortlisted for an FDATA Open Finance Award Mnemonic Security, Inc. has made the shortlist for the Financial …
Read More