How Expired Digital Certificates Can Be a Nightmare?
How Expired Digital Certificates Can Be a Nightmare? The need to protect corporate data from increasing cyberattacks continues to be the top priority of every organization. One of the most important w...
Why Is It Important? East-West and North-South Traffic Security
Why Is It Important? East-West and North-South Traffic Security Data centers are physical facilities designed to support your business applications, AI activities, file sharing, communications and col...
An Overview of Optiv CTI Estimate 2020: Attack Tools, Techniques and P...
An Overview of Optiv CTI Estimate 2020: Attack Tools, Techniques and Procedures The term Tools, Techniques and Procedures (TTPs) refers to a method used to evaluate the cyber activity or to identify a...
How to Build a SOC With Open Source Solutions?
How to Build a SOC With Open Source Solutions? The SOC is the information security department that continually tracks, analyzes, and enhances the security situation of an enterprise. The goal of the S...
How to Find Subdomains Using Free Online Services?
How to Find Subdomains Using Free Online Services? Subdomains are critical assets of your software applications and server infrastructure. They contain numerous details that can be useful to threat ac...
How to Empower Your SOC Teams with Cyber Threat Intelligence?
How to Empower Your SOC Teams with Cyber Threat Intelligence? SOC teams have to monitor, analyze, and manage the great volumes of warnings and alerts created by the networks. It takes too long to go o...
What’s External Attack Surface Management? Absolute Beginner Guide
What’s External Attack Surface Management? Absolute Beginner Guide External attack surface management (ASM) is the process of discovering, listing, classifying, analyzing, prioritizing, and monitoring...
Top 10 Threat Intelligence Certifications: Empower Your Analysis Skill...
Top 10 Threat Intelligence Certifications: Empower Your Analysis Skills Threat Intelligence plays a key role in providing the relevant intelligence for companies to help them carry out protective meas...
Different Types of Threat Intelligence: What is It & Who is It for?
Different Types of Threat Intelligence: What is It & Who is It for? The information provided by the threat intelligence, it makes a significant contribution to various business decisions in organ...
What’s MITRE PRE-ATT&CK and How To Use It in Threat Intelligence?
What’s MITRE PRE-ATT&CK and How To Use It in Threat Intelligence? Founded in 1958, MITRE is a non-profit company whose mission is to solve the problem of a safer world. A new curated knowledge ba...
What You Need To Know About Traffic Light Protocol Usage in Threat Int...
What You Need To Know About Traffic Light Protocol Usage in Threat Intelligence There are a few standards and formats for timely and more effective exchange of sensitive intelligence, and Traffic Ligh...
Open Source Intelligence (OSINT) 101
Open Source Intelligence (OSINT) 101 Open Source Intelligence, better known as OSINT, is a technology that refers publicly available and open sources of information (as opposed to covert or secret sou...
An overview of Verizon’s 2020 Data Breach Investigation Report: A Deep...
An overview of Verizon’s 2020 Data Breach Investigation Report: A Deep Look into Attacks, Attackers and Victims For a better security posture, you need to be aware of what is going on around your indu...
Types of Threat Intelligence Gathering
Types of Threat Intelligence Gathering For better security functioning, all organizations need reliable but also real-time cyber threat intelligence. Producing threat intelligence is a complex process...
5 Stages of The Threat Intelligence Lifecycle
5 Stages of The Threat Intelligence Lifecycle Real-time and reliable cyber threat intelligence is essential for the security functions of organizations. It is leveraged by organizations of different s...
The Difference Between Data, Information and Intelligence
The Difference Between Data, Information and Intelligence Data. Information. Intelligence. Oftentimes confused by people, these very different terms can not be used interchangeably but have a tight co...
10 GitHub Security Best Practices
10 GitHub Security Best Practices GitHub is a standard when it comes to sharing code among developers. It is the most essential platform used by developers in every company, and despite the broad usag...
10 Best Dark / Deep Web Browsers for Anonymity
10 Best Dark / Deep Web Browsers for Anonymity The deep web is the underground of the whole web. Accessing it is not quite difficult, but you need to follow some basic steps in order to retain your pr...
How to (Safely) Access the Deep Web and Darknet
How to (Safely) Access the Deep Web and Darknet You have definitely heard there is a deep side to the internet where not everyone can access it. That is considered by many as hazardous and even illega...
Tools and Features That Can Be Used To Detect Sensitive Data Leaks Fro...
Tools and Features That Can Be Used To Detect Sensitive Data Leaks From Github – Part 2 In part 1 of this blog series, we discussed a few popular osint tools that help developer’s find leaked informat...