How to Detect and Prevent Crypto Mining in your Environment
The explosion of crypto prices for many cryptocurrencies has brought more attention to them and more people want to earn cryptocurrencies by "mining" them...
How to Become a Cybersecurity Expert
Cybersecurity has become increasingly popular in the last decade. It has seen great interest from technical and non-technical people wanting to take their opportunity...
Cloud Threat Report 2020
TheCISO -
Oracle and KPMG published the "Cloud Threat and Security Report 2020" which identifies the key risks and challenges that organizations are facing as they...
Penetration Testing: Pre-Engagement Interactions
One important and often overlooked step in the penetration testing process is the pre-engagement interactions with the client. Preparation is key for every PenTest...
How to protect your company from insider threats
Insider threat incidents have risen 44% over the past two years according to the 2022 Cost of Insider Threats: Global Report, with costs per...
A Simple Summary of GDPR
Know what GDPR is and how it can protect and give you more control over your personal data. You have rights over your data,...
Many Ways to Attack DNS Servers
The importance of the DNS service for the internet is widely understood. Most applications today rely on DNS to locate resources across the internet...
Only Half of Organizations Say Their Security Teams Are Prepared for CyberAttacks
TheCISO -
ISACA professionals responded to a recent survey on whether they are ready to detect and respond to the rising cybersecurity attacks during COVID-19.
ISACA surveyed...
Five Penetration Testing Frameworks and Methodologies
Pentesting aims to evaluate information security measures through the eyes of a potential attacker with the aim of testing the effectiveness of security controls.
A...
What Is Google Dorking?
For normal users, Google is the most famous search engine in the world. For those who know how to perform advanced Google searches it...
DevSecOps: Why You Should Put “Sec” in DevOps.
In a short period of time, a span of less than a decade the IT infrastructures have undergone huge changes. We see more shared...
Docker Security Practices
Docker may be a new thing for many environments but it has been around long enough to be considered ready for production use. Like...