1.7 C
Paris
Sunday, January 29, 2023

Articles

Cybersecurity Analyst Interview Questions

The following list of questions is by no means exhaustive and some answers and explanations given for each are also non-exhaustive, but rather guidance...

Black Hat USA 2022: Are Cybersecurity Tool Standards on the Way?

One of the biggest challenges cybersecurity teams face, aside from constantly having to foil threat actors, is to integrate data from the various tools...

Pentest Interview Questions

If you are applying for a penetration testing role, then chances are that you will go through an in-depth interview, for which you should...

Penetration Testing vs Vulnerability Scanning

Penetration testing vs vulnerability scanning, is there a difference? Should you choose between them or both? There is a lot of misunderstanding and confusion between...

Data Breaches Reach All-Time High

According to a new IBM security report, the global average cost of data breaches reached $4.35 million in 2022 which is an all time...

8 Top Cybersecurity and Information Security Job Positions

In this post, we will share the top cybersecurity and information security job positions requested by employers, and the typical education requirements, certifications, and...

Three New Web Application Security Risks Climb Up The OWASP Top 10

OWASP Top 10 is a standard awareness document which represent a consensus about the most critical security risks to web applications. For the year 2021,...

Three Approaches to Penetration Testing

Penetration testing is a form of ethical security assessment which aims to help organizations identify, safely exploit, remove vulnerabilities and overall improve security across...

ThePhish: An Open Source Phishing Email Analysis Tool

A new open source phishing email analysis tool has been published on Githhub, which helps automate the analysis process. ThePhish, was created by Emanuele Galdi,...

How to Secure Your Microservices

Compared to monolithic applications, which house all code in a single system, microservices are small, autonomous units that address individual functions and work with...

War Between Russia and Ukraine Goes Cyber

The war between Russia and Ukraine goes "Cyber", with several ongoing cyber-attacks from the Russian side, targeting Ukraine's banks and government department websites. A cyber...

A New Tool to Help You Reveal Sensitive Information

Bishop Fox have released a new tool to help you reveal sensitive information which has been redacted by the method of pixelation from a...

Latest