EXECUTIVE SUMMARY “Use cases are the core of security monitoring activities. A structured process to identify, prioritize, implement, and maintain use cases allows organizations to align...
Category: User most voted post
A Complete Guide to Modernizing your Security Operations Centers (SOCs) by Microsoft and CyberProof
INTRODUCTIONHaving a security operations center (SOC) is no longer a privilege of large organizations. With growing cyber attacks and a changing technology landscape, all companies are...
Microsoft Active Directory – Security Self Assesment Guide 2022 by Huy Kha
SummaryActive Directory is the backbone of identities for many organizations around the world, but it isoften not managed well, which open the doors for attackers to...
Cybersecurity Open Source Tools
Overview• Pillars of Cybersecurity• Cybersecurity Fundamentals• Introduction to Open Source Tools• What are they?• Overview of Key Players• Types of Open Source Tools• SWOT Analysis of...
FORENSIC INVESTIGATION OF NMAP SCAN WITH WIRESHARK BY IGNITE TECHNOLOGIES
IntroductionToday we are discussing how to read hexadecimal bytes from an IP packet that helps a network adminidentify various types of NMAP scanning. But before moving...
ASSESSING OPERATIONAL TECHNOLOGY (OT) CYBERSECURITY MODEL – AN ANALYSIS OF LEASED DATACENTERS UTILIZING THE CYBERSECURITY MATURITY MODEL CERTIFICATION (CMMC) BY DRAGOS
INTRODUCTION In early 2021, Dragos began conducting a series of assessments to evaluate the overall cybersecurity maturity of the operational technology (OT) environment for several leased...
EVIL PLC ATTACK – WEAPONIZING PLCS By Team82, Claroty Research Team
TEAM82 RESEARCH EXECUTIVE SUMMARY Programmable logic controllers (PLCs) are indispensable industrial devices that control manufacturingprocesses in every critical infrastructure sector. Because of their position within automation,...
The Pentester Blueprint – a Guide to Becoming a Pentester
whoami: Phillip Wylie, CISSP, OSCP, GWAPTPrincipal Pentester @ US BankAdjunct Professor @ Richland College Ambassador @ BugcrowdThe Pwn School Project Founder• 21+ years IT and InfoSec...