3 MUST DO in #Cybersecurity
We have all heard or seen the headlines Sony gets hacked, Home Depot Credit Card processing stolen, Target credit Card processing stolen, and more and more companies are all getting…
Defend Your Systems
We have all heard or seen the headlines Sony gets hacked, Home Depot Credit Card processing stolen, Target credit Card processing stolen, and more and more companies are all getting…
Official Kali Linux BBQSQL site: http://tools.kali.org/vulnerability-analysis/bbqsql BBQSQL is a Python based blind SQL injection tool to test your SQL connections on the Internet. (why bbq? because SQL injection is delicious)…
A great SECINT (Security Intelligence) paper John Stewart wrote: http://www.cisco.com/web/about/security/intelligence/JNS_TTPs.pdf Basics must be mastered: patching Identity: Strong identity, federated Identity, and identity based networking Eliminate dark space Notice that the…
It would be a good idea to test your system hacking skills on systems that are not production systems. But who has time to create systems with a few vulnerabilities?…
From Wikipedia. The problem is, Cybersecurity seems easy to those of us in the Security field (just like the above game) but yet the strategy is hard when we try…