raja manisynackwithraj.hashnode.dev·Aug 13, 2024Learn like a baby - Vendor Agnostic Hunting approaches for modern authentication abuse using AITM - 3In this blog we have structured this into three parts The Act, The Analysis and The Detection and go through each part in very simplistic way to understand and approach them. The Act talks about Modern authentication abuse using AITM The Analysis t...Discuss·81 readsCloud Attacks - AzureAitm
Ezequiel Virunezequielvirun.com·Jul 27, 2024Cyber Repercussions vs InvestmentsEl panorama de amenazas evoluciona mas rapido que las organizaciones, por lo cual se debe invertir en medidas sólidas de ciberseguridad para preservar sus activos. Trasladar esta necesidad de inversion a una junta directiva es desafiante y demostrar ...Discussrisk management
Oluwadamilola Bamigbosedamibamigbose.hashnode.dev·May 3, 2024Understanding and Addressing Organizational Cyber RisksIn a perfect world, we can secure everything from everything. But since we’re not in a perfect world, to effectively manage risks, organizations must be well aware of their risk landscape and where to put in remediation efforts to limit their exposur...Discussrisk management
Nikhil Pandeynikhilpandeydigital.hashnode.dev·Mar 13, 2024What Is Threat Modeling?Threat modeling is the process of using hypothetical scenarios, system diagrams, and testing to help secure systems and data. By identifying vulnerabilities, helping with risk assessment, and suggesting corrective action, threat modeling helps improv...Discuss·10 likesDREAD threat modeling
Tudor Purcarelucyberhashira.com·Nov 11, 2023The Game-Changing Impact of Threat ModelingMy quest for advanced knowledge recently led me to Adam Shostack’s book, "Threat Modeling." Approaching the subject with both excitement and curiosity, I found this book to be an exceptional resource. Not only did it provide a comprehensive overview ...Discussthreatmodelling
Vipin Shreyas Kumarvipinshreyaskumar.hashnode.dev·Sep 4, 2023Container Security Ecosystem: ExplainedThe Container Security Ecosystem The diagram above encapsulates the key components and measures in container security: Attack Surfaces Images: The foundational blueprints for your containers. Image Registries: Repositories for storing these bluepr...Discusscontainers
partyush goyalpartyushgoyal.hashnode.dev·Aug 22, 2023Aribot: Empowering Secure Software Development with Ayurak AIAribot, powered by Ayurak AI, stands as an exceptional solution that provides invaluable security and compliance insights for your code supply chain and cloud infrastructure. This powerful tool is designed to assess your systems against industry stan...Discussthreatmodelling
partyush goyalpartyushgoyal.hashnode.dev·Aug 15, 2023Securing Your Public Cloud Infrastructure: Best Practices and StrategiesThe rise of public cloud computing has revolutionized the way organizations manage and deploy their IT infrastructure. While the benefits of scalability, flexibility, and cost-efficiency are evident, the security of public cloud infrastructure remain...DiscussCloud
Michael K. Aboagyering3.hashnode.dev·Jun 15, 2023Threat Modeling Vs. Vulnerability ManagementAlthough threat modeling and vulnerability management help businesses secure data infrastructures and services, there are differences. This article discusses the differences between threat modeling and vulnerability management. We look at the pros an...Discuss·98 reads#cybersecurity
Santoshdtssantoshdts.hashnode.dev·Apr 25, 2023Threat Modeling 101: A Beginner's Guide to Securing Your SoftwareIntro and Why is Threat Modeling Necessary? With the increasing use of technology in all aspects of our lives, the threat landscape has become more complex and challenging. Threat actors are becoming more sophisticated in their attack methods, and th...Discuss·32 readsWeMakeDevs