TATHAGATA ROYthreatradar.vercel.app·Sep 22, 2024Security Audit and Compliance Toolkit (Windows) – A Comprehensive Guide with Code WalkthroughIntroduction to Security Audit and Compliance Toolkit In today's digital landscape, ensuring the security and compliance of our systems is crucial. With threats ranging from unauthorized access to data breaches, organizations must regularly conduct s...Discuss·56 readsSecurity
Chris Nunitochrisnunito.hashnode.dev·Jul 9, 2024The Role of HDR Cameras in Intrusion Detection SystemsIn today's world, security is a paramount concern for both individuals and organizations. Traditional surveillance cameras often struggle with low light conditions, harsh contrasts, and dynamic environments. This is where High Dynamic Range (HDR) cam...Discusstechnology
Gunjan Mehtagunjanmehta01.hashnode.dev·Dec 14, 2023Day 13 of Advent of Cyber 2023!Back Story! The company is going through a merger, and there have been some concerning activities. To make sure our systems are safe from future attacks, McSkidy has put together a team, led by McHoneyBell, to focus on protecting the company. You're ...Discuss#cybersecurity
Dwayne McDanielforGitGuardiangitguardian.hashnode.dev·Aug 8, 2023How to Secure Your Productivity Tools with GitGuardian HoneytokenIn today's digital age, we've gotten pretty comfortable using digital tools for everything---from communications to keeping track of project timelines. Some of our go-to's include Email, Jira, Slack, Linear, Asana, and Notion. They don't just smooth ...DiscussSecurity
Dwayne McDanielforGitGuardiangitguardian.hashnode.dev·Aug 7, 2023Using GitGuardian Honeytoken [cheat sheet included]Download the cheat sheet GitGuardian is dedicated to making code security and intrusion detection as simple and scalable as possible. That is why we are proud to introduce GitGuardian Honeytoken. Honeytokens are decoy credentials that do not allow ac...Discusshoneytokens
Mukesh Sai KumarforChakravyuha - The Digital Battlefieldblog.rudrasecure.com·Mar 24, 2023Network traffic monitoring when your cloud provider is actively working against youNetwork traffic monitoring is essential for large-scale networks and organizations to actively detect and prevent intrusions at the network level as they're happening. When your infrastructure is in the cloud, you don't always have full control over ...Discuss·49 readsCloud
Dwayne McDanielforGitGuardiangitguardian.hashnode.dev·Feb 24, 2023Intrusion Detection Through Cyber Deception: Disrupting Attacks With An Active DefenseWe should do our best to ensure our network and pipeline perimeters are secure and make it hard for attackers to gain access. However, the reality is that intruders will stop at nothing to gain access, as evidenced by the Uber, CircleCI, and Dropbox ...Discuss·41 readsHoneypot