Saturday, 31 October 2020

Why Modern Businesses Implement Microsoft Azure

Operating business with the cloud is getting more popular among enterprises. Microsoft Azure is regarded as an emerging market leader in the cloud computing industry. It offers businesses a wide scope of cloud services, including computing, storage, analytics, and networking. The main goal of the Azure platform is...

Thursday, 29 October 2020

5 Phases of the Secure Software Development Life Cycle (SDLC)

Most organizations have well-oiled machines in place when designing, launching, and maintaining functional software but not so much when securing that software. This is why your organization needs to incorporate security measures into the SDLC (Software Development Life Cycle). Through this, you’ll enable, instead of restricting, the delivery...

Tuesday, 27 October 2020

What Is Security Incident and Event Management (SIEM)?

Security Incident and Event Management (SIEM—pronounced as SIM or SEEM) is a security management approach, which combines functions of Security Information Management (SIM) and Security Event Management (SEM) to define a sound security management system. While SIM focuses on automating the collection of log data, events, and flows...

Sunday, 25 October 2020

Open-Source Intelligence Makes Pentesting Very Easy

Pentesters have to work with large amounts of information. Finding this information can be done manually – that’s Option A. But this can be time-consuming since you’d have to sort this data by yourself because it might not be in a preferable format. Option B relies on open-source...

Thursday, 22 October 2020

3 of the Most Common Python Security Vulnerabilities

Python is one of the fastest-growing programming languages in the world. According to Slashdata, there are 8.2 million active python users in the world. It is mostly used by Software Engineers but also by Mathematicians, Data Analysts, and students for various purposes like automation, artificial intelligence, big data...

Tuesday, 20 October 2020

3 Secure Methodologies to Create A Secure Application

Nowadays, application security is one of the things that can make or break an entire company. This is because ignoring security issues can expose an organization to more risks. Furthermore, organizations store a lot of sensitive data in business applications, and the data can easily be stolen by...

Saturday, 17 October 2020

CISO and DPO – Is this a Dual Role of a Security Officer?

In the previous hierarchy of an organization, the CISO is often held responsible for integrating privacy requirements into security program controls. With the EU’s General Data Privacy Regulation (GDPR), a new role was introduced – Data privacy officer (DPO). This role is closely associated with the General Counsel...

Thursday, 15 October 2020

4 Ways to Double Pivot When Penetration Testing

Usually, while performing a penetration test or other security assessment form, it starts with an external network, accompanied by vigorous research and pen-testing of systems and services accessible from the global network. Efforts are made to detect a security loophole and, if this happens, a penetration into the...

Tuesday, 13 October 2020

How to Build a Cyber Threat Intelligence Team

Nowadays, cyber threats are rapidly evolving because of the increased sophistication of attacks and motivations behind an attack. However, organizations can protect themselves from cyber threats by hiring expertise available outside of the organization. Security professionals and executives need threat intelligence to get more information about cyber threats...

Saturday, 10 October 2020

4 Threat Modeling Methodologies – Tools and Processes

Cybersecurity has become a major concern today, given the speedy growth of security breaches and data-motivated technologies. Leading industry analysts predict that this trend will persist for a long time considering the current state of cybersecurity. As such, threat modeling is needed to prevent malicious attacks and protect...

Pages (26)1234567 »