16.4 C
Paris
Thursday, March 23, 2023

AUTHOR

Dimitris Gkoutzamanis

88 POSTS
Dimitris is an Information Technology and Cybersecurity professional with more than 20 years of experience in designing, building and maintaining efficient and secure IT infrastructures. Among others, he is a certified: CISSP, CISA, CISM, ITIL, COBIT and PRINCE2, but his wide set of knowledge and technical management capabilities go beyond these certifications. He likes acquiring new skills on penetration testing, cloud technologies, virtualization, network security, IoT and many more.

Many Ways to Attack DNS Servers

The importance of the DNS service for the internet is widely understood. Most applications today rely on DNS to locate resources across the internet...

Five Penetration Testing Frameworks and Methodologies

Pentesting aims to evaluate information security measures through the eyes of a potential attacker with the aim of testing the effectiveness of security controls. A...

What Is Google Dorking?

For normal users, Google is the most famous search engine in the world. For those who know how to perform advanced Google searches it...

DevSecOps: Why You Should Put “Sec” in DevOps.

In a short period of time, a span of less than a decade the IT infrastructures have undergone huge changes. We see more shared...

Docker Security Practices

Docker may be a new thing for many environments but it has been around long enough to be considered ready for production use. Like...

Defense in Depth – The Layered Approach to Cybersecurity

Defense In Depth is a common terminology in modern-day cybersecurity practices. It is a strategy that employs a series of mechanisms, also known as...

Latest news