2020 Verizon Data Breach Investigations Report: Summary and key findings for security professionals

| | General Security
Introduction The Verizon Data Breach Investigations Report, or the Verizon Data Breach Report, is an annual report intended for information security professionals. It summarizes 3,950 confirmed data breaches and is a collection ...

Cost of non-compliance: 8 largest data breach fines and penalties

| | General Security
Introduction Different regulations and laws will slap organizations with fines and penalties for data breaches. This is because the organization did not take the privacy of their data seriously. However, the authorities ...

Implementing a zero-trust model: The key to securing microservices

| | General Security
Introduction Organizations are increasingly integrating microservices into their software development processes. As noted by DZone, microservices break down software into multiple component services, thereby enabling organizations to deploy parts of an application ...
How to create a subdomain enumeration toolkit

How to create a subdomain enumeration toolkit

| | General Security
Introduction A domain name is an important part of the reconnaissance process during a security assessment or even for many bug bounty challenges. In this article, we’ll look at how a domain ...

Japan’s IoT scanning project looks for vulnerable IoT devices

| | General Security
The growing world of IoT — and security concerns The Internet of Things (IoT) is still a baby compared to other computing technologies, but the market has already exploded and continues to ...

Are open-source security tools secure? Weighing the pros and cons

| | General Security
Introduction There is a myth that good security solutions are necessarily expensive, but the truth is that there are many options, not only at low cost, but even excellent free tools that ...

The business value of CompTIA CySA+ employee certification

| | General Security
Introduction The cybersecurity threat landscape is rapidly evolving, and cybercriminals are becoming more sophisticated. Traditional threat detection techniques that rely on signature-based threat... Go on to the site to read the full ...

10 Most Popular Password Cracking Tools [Updated 2020]

| | feature, General Security
Passwords are the most commonly used method for user authentication. Passwords are so popular because the logic behind them makes sense to people and they’re relatively easy for developers to... Go on ...

How to verify and respond to vulnerability reports from security researchers

| | General Security
Introduction Part of doing business in today’s increasingly cyber-world is dealing with security vulnerabilities and bugs that come up along the way. Many organizations first learn about a... Go on to the ...

8 Best WordPress Security Plugins

| | feature, General Security
Over a third of websites (37%) are hosted on WordPress, making it the world’s most popular content management system (CMS). This includes everything from blogs to e-commerce sites that collect and... Go ...