Network security January 27, 2021 Frank Siemons Open Source IDS: Snort or Suricata? [Updated 2021] Although early types of Network Intrusion Detection Systems go back all the way to the early 1980s, the concept of IDS took off when Martin Roesch created...
CGEIT January 27, 2021 Greg Belding How To Become CGEIT Certified – Certification Requirements Those working in enterprise IT governance, compliance and risk management may want to earn the Certified in Governance of Enterprise IT certification (CGEIT)....
DoD 8570 January 27, 2021 Daniel Brecht PenTest+: DoDD 8570 overview In November 2020, the US Department of Defense (DoD) has selected CompTIA PenTest+ as an approved certification for military personnel and defense contractors...
Digital forensics January 26, 2021 Srinivas Email forensics: Web-based clients This article discusses how to perform forensic investigations of Web-based email clients. While many organizations use Desktop based email clients for their...
Cyber ranges January 26, 2021 Lester Obbayi Why the SOC operations teams needs a cyber range The Security Operations Centre (SOC) is the nerve center of the Blue Team or incident response team in any organization. This crucial team acts as the first...
CGEIT January 26, 2021 Greg Belding Maintaining Your CGEIT Certification: Renewal Requirements The Certified in Governance of Enterprise IT certification, or CGEIT, is a vendor-neutral IT governance certification hosted by ISACA. The certification is...
Digital forensics January 26, 2021 Srinivas Email Analysis In this article, we will explore the fundamentals concepts associated with email that will help us to perform email analysis. We will begin by understanding...
Security+ January 25, 2021 Daniel Brecht Security+: Studying for the Exam [updated 2021] So, you’d like to become a computer security professional? Entering the field requires a combination of in-depth theoretical knowledge and practical skills:...
Application security January 25, 2021 Susan Morrow Software maturity models for AppSec initiatives Software is on the front lines of security: a 2019 report from GitLab found that almost half of respondents deploy software on-demand or multiple times per...
Digital forensics January 25, 2021 Srinivas Investigating Wireless attacks In the earlier articles, we discussed the fundamentals of Wireless networks covering the common types of wireless devices, terminology used, WLAN Security types,...