feature
The 10 Best Compliance Podcasts You Should Listen To In 2024
Podcasts have exploded in popularity over the past several years, and it’s not difficult to see why. A sort of natural evolution of the traditional radio show, podcasts make for perfect listening ...
Why Use Automated Compliance Solutions in 2024
Compliance automation has never been more important as companies face frequently updated regulations and a growing cost of non-compliance. A recent study found that the cost of non-compliance is 2.71 times higher ...
Combating Alert Fatigue with the MixMode AI Assistant
Combating alert fatigue is a huge challenge faced by SOC analysts and security companies alike. The overwhelming flood of rules-based alerts and notifications can often lead to missed critical incidents and increased ...
How to Detect PowerDrop Command & Control Malware
MixMode Sales Engineer, Josh Snow, explores a real-time threat detection use case involving The MixMode Platform and its ability to identify PowerDrop, a malicious Powershell script that has been specifically targeting the ...
Average CCNA salary 2020
Introduction The CCNA (Cisco Certified Network Associate) is one of the most well-known entry-level certifications within the IT industry. Holding this credential proves your ability to install,... Go on to the site ...
10 Most Popular Password Cracking Tools [Updated 2020]
Passwords are the most commonly used method for user authentication. Passwords are so popular because the logic behind them makes sense to people and they’re relatively easy for developers to... Go on ...
Understanding DoS attacks and the best free DoS attacking tools [Updated for 2020]
A Denial of Service (DoS) attack is designed to cause service outages. These attacks can easily cost an organization a significant amount in damages and wasted resources, even if the attacker does ...
8 Best WordPress Security Plugins
Over a third of websites (37%) are hosted on WordPress, making it the world’s most popular content management system (CMS). This includes everything from blogs to e-commerce sites that collect and... Go ...
PDF File Format: Basic Structure [updated 2020]
Introduction We all know that there are a number of attacks where an attacker includes some shellcode in a PDF document. This shellcode uses some kind of vulnerability in how the PDF ...
Hacking the Tor Network: Follow Up [Updated 2020]
Introduction In a previous post, I presented the main techniques used to hack Tor networks and de-anonymize Tor users. Law enforcement and intelligence agencies consider... Go on to the site to read ...