ShowMeCon 2018 Track 3 00 Whos Watching the Watchers Nathan Sweaney

10 Tips for Engaging a Security Services Vendor

The Information Security market brought in an estimated $167 billion in 2019 and that’s expected to double in the next 4-5 years according to some estimates. With that huge growth comes an ...
DAST

Benefits of DAST Testing for Application Security

Running some random static tests on the code is the first step to detect different vulnerabilities that can put the.. The post Benefits of DAST Testing for Application Security appeared first on ...
File Encryption Using VHD and BitLocker

File Encryption Using VHD and BitLocker

When I was thinking of topics to write about, the idea of protecting the data we work with came to mind. There’s always some sort of data that we want to keep ...

Segmentation penetration testing for PCI compliance

Introduction – an overview of Network Segmentation Network segments are now a part of any organization or business’s infrastructure. Network segmentation is the splitting of a computer network... Go on to the ...
Microservices Architecture

Penetration Testing in the times of APIs and Microservices

In ever-evolving cyberspace, the sources of threats cannot be limited to a certain extent. Most of the security incidents we see.. The post Penetration Testing in the times of APIs and Microservices ...
Completely automated packer build for kali

Automating Red Team Homelabs: Part 2 – Build, Pentest, Destroy, and Repeat

As of 2019-05-14 the Funny Stories section has been updated. Now that we understand what the goal is from my first blog post, we can move into the good stuff! The packer ...
Information Gathering [Updated 2019]

Information Gathering [Updated 2019]

Learn about passive intelligence gathering Learn about passive intelligence gathering, one of the key aspects of ethical hacking, in this four-video overview course. This skills course covers ⇒... Go on to the ...
DAST: Things You Should Know

DAST: Things You Should Know

The relationship between security testing and applications is a never-ending story. Even after an application is deployed, security testing activities.. The post DAST: Things You Should Know appeared first on BreachLock ...

Post-Quantum Cryptography Series

| | Penetration Testing
Perhaps you have heard of quantum key distribution, or perhaps you are curious as to what quantum computers with sufficient qubits and quantum error correction will mean to the confidentiality and integrity ...
Important Security Aspects for a SaaS Company

Penetration Testing for SaaS Companies

If you are running a SaaS company, your requirements change continuously due to a variety of factors. These factors include.. The post Penetration Testing for SaaS Companies appeared first on BreachLock ...
Loading...