AWS Common Issues – Part 2

Pentesters use a comprehensive and complete toolkit to…


New research findings from Faraday goes to DEF CON

Pentesters use a comprehensive and complete toolkit to…


Cybersecurity is a secondary objective, and that’s what we’ve been getting wrong.

A rapidly growing business must choose where to locate its…


Continuous testing, continuous security

Cybersecurity as a constant race, in which attackers and…


Top 5 security tips: AWS Cloud Infrastructure

Improve your security posture on AWS Read the following…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Understanding Spring4Shell

According to Cisco’s Annual Internet Report, nearly…


Securing open source software (Part 2)

Open-source software increases its presence in data…


Pentesting toolkit: all you need to know

Pentesters use a comprehensive and complete toolkit to…