Table of Contents In this article, I would like to help you be better prepared for your next penetration test (“pen test”). If you’ve never had a penetration test, then this article will help you skip your “first” penetration test experience, which will likely contain these basic problems that are relatively easy to fix. Each […]
Category: Cyber Security
Modern Endpoint Manager
Table of Contents What is Microsoft Endpoint Manager? In this article, I am going to Talk about the evolution of endpoint management, the challenges organizations face, and the benefits of Microsoft’s endpoint manager solution. Before we dig in, one must ask what the difference is between MDM (Mobile Device Management), EMM (Enterprise Mobility Management) , […]
What is Vulnerability Management?
Table of Contents So What is Vulnerability Management? In this article, I am going to explain what it takes to implement a world-class vulnerability management program. Vulnerability management is simple! It’s just managing vulnerabilities, right? It’s literally right there in the name! Actually, vulnerability management is a continuous, cyclical process that often involves multiple technology […]
How to use Kape for Fast and Flexible Incident Response
Table of Contents Abstract As the rate of cyber-attacks continues to increase, it is essential for organizations to respond to security incidents quickly. The faster that Incident Responders can begin analyzing evidence, the better chance that they have to prevent additional malicious activity after compromise. This research intends to focus on how to use Kape […]