Introduction I’ve been writing cybersecurity articles for many years, and in that time, I have only seen increasingly complex security threats. Cybercriminals take their craft seriously. They treat cybercrime as a business, looking for ways to maximize profit while seeking innovative methods to circumvent our efforts to protect our businesses.The figur
IntroductionThe Verizon Data Breach Investigations Report, or the Verizon Data Breach Report, is an annual report intended for information security professionals. It summarizes 3,950 confirmed data breaches and is a collection of work from 81 contributors spanning 81 countries and has grown more than a little bit since last year’s twelfth edition. Navi
IntroductionOrganizations are increasingly integrating microservices into their software development processes. As noted by DZone, microservices break down software into multiple component services, thereby enabling organizations to deploy parts of an application without compromising the integrity of the entire program. This property also allows develo
IntroductionDifferent regulations and laws will slap organizations with fines and penalties for data breaches. This is because the organization did not take the privacy of their data seriously. However, the authorities take this responsibility very seriously and will not hesitate to punish with fines and penalties that are sometimes in the hundreds of
The growing world of IoT — and security concernsThe Internet of Things (IoT) is still a baby compared to other computing technologies, but the market has already exploded and continues to expand at a healthy pace. Telecommunications giant Ericsson estimates the number of IoT connections to grow from 10.8 billion in 2019 to 24.9 billion in 2025, or a 15
IntroductionA domain name is an important part of the reconnaissance process during a security assessment or even for many bug bounty challenges. In this article, we’ll look at how a domain can be classified. Within this context, two scenarios of how to take advantage of domain misconfigurations will be analyzed. Finally, we’ll discuss building a subdo
IntroductionThere is a myth that good security solutions are necessarily expensive, but the truth is that there are many options, not only at low cost, but even excellent free tools that can be employed to protect most businesses.A good example of this is OWASP’s list of free for Open Source Application Security Tools, which includes solutions fo
IntroductionThe cybersecurity threat landscape is rapidly evolving, and cybercriminals are becoming more sophisticated. Traditional threat detection techniques that rely on signature-based threat detection are no longer effective. In fact, signature-based antivirus systems were only capable of detecting and blocking half of malware in the last quarter
IntroductionBefore delving into top cybersecurity books for IT auditors, it is essential to have a short look at who IT auditors are.IT auditors are responsible for examining and evaluating the enterprise’s IT policies, operations and technological infrastructure. They make sure that corporate assets are properly protected and that data integrity is en
IntroductionThe OWASP Top 10, a widely referenced document that lists the key threats to modern web applications, hasn’t changed much in the past few years. Broken access controls, cross-site scripting, insecure configuration, broken authentication — these are some of the risks we’ve been constantly warned about since 2003. The issue with this is that
Introduction: Why use cybersecurity forums and subreddits for continuing education?Cybersecurity continues to be one of the most strategically important issues in the digital world today and is also a field in which professionals are challenged by the fast pace in which technology and scenarios continue to change. Cybersecurity experts are asked to con
IntroductionIn the US, Chinese restaurant menus usually have many combination plates available for lunch or dinner, each representing a particular grouping of ingredients in a specific ratio. These combinations can grow to huge numbers, sometimes into the hundreds at particularly busy restaurants. Having common reference points for these particular com
IntroductionMarriott is one of the best-known leisure brands in the world, specifically in the hotel and hospitality industry. It has over 7,300 hotels and guest properties globally in over 134 countries. Marriott also has many other well-known brand names within the group, such as Sheraton Hotels and Resorts and Westin Hotels and Resorts. The Marriott
Introduction: Get certified from home during the COVID-19 pandemicEnabling employees to work from home during the COVID-19 outbreak has not only allowed employers to ensure the safety and well-being of staff with less impact on productivity and operations. It has also provided an occasion to upskill their current talents by allowing them to engage in c
IntroductionMany people often wonder about what DevOps is and what a DevOps engineer actually does. DevOps tools range from scripts to applications and systems to help automate and integrate development procedures within an IT operations environment. We have gathered a list of useful information and we hope to give you a better idea as to what the DevO