A Simple Guide To Secure IoT Devices
The Internet of Things (IoT) refers to the growing network of small, low-powered devices such as sensors and controllers that are connected to the...
Understand And Reduce Your Attack Surface
The attack surface of your organization can be defined as all the possible entry points an attacker may try to exploit to gain access...
Top Tools For Kubernetes Security
Container technology has become increasingly popular and the use of docker makes it even easier to develop, ship, and run applications using containers.
Kubernetes is...
Top 10 CI/CD Security Risks Guideline From OWASP
Continuous integration (CI) and continuous delivery (CD), also known as CI/CD, embody a culture, operating principles, and a set of practices that application development...
What Is The Difference Between GWAPT and OSWE Penetration Testing Certifications
GWAPT and OSWE are among the top certifications in security and are mainly built for penetration testers.
Let's look at the differences between the two...
Pentagon Supply Chain Fall Short Of Meeting Cybersecurity Requirements
Nation-state hackers are targeting defense contractors with sophisticated cyberattack campaigns in order to gain access to information sensitive to national security.
A recent independent study...
Most Organizations Still Vulnerable To The Log4j Vulnerability
A study examining the scope and impact of the recent Log4j vulnerability has been conducted by Tenable and the results are extremely interesting.
According to...
What is a Vishing Attack?
Social engineering attacks use the “human loophole” to get around security controls. Instead of hacking your accounts to steal your identity, they hack you....
Why Is Database Encryption Important?
With data breaches continuing to occur at an alarming rate, protecting sensitive data is critical for all businesses. As organizations store more data than...
Cybercrime: Face the Facts
We need to face some hard facts, to move forward.
Fact #1: cybercrime is here to stay
It has been around for many decades, but in...
Steps to a Secure Portfolio: Due Diligence During M&A & Beyond
Did you know that less than five percent (5%)1 of organizations engaging in mergers and acquisitions (M&A) will consider cybersecurity risk assessments during the...
How to get Cybersecurity experience as a beginner?
The demand for skilled workers is constantly growing and if you are a beginner in infosec/cybersecurity, you need to find ways to acquire relevant...