cybersecurity

What is Vulnerability Management?

According to NIST, vulnerability management is a security practice that is designed to proactively prevent the exploitation of IT vulnerabilities that exist within an organization. The expected result is to reduce the time and money spent dealing with vulnerabilities and the exploitation of those vulnerabilities. Vulnerability management is generally defined as the process of identifying, …

What is Vulnerability Management? Read More »

What is AAA in Cybersecurity?

The Authentication, Authorization, and Accounting (AAA) protocol provides the necessary framework to enable scalable access security.The framework is designed to control who is allowed to connect/access network resources, what they are allowed to do when they are connected, and keeps track of who logged in and what they did while logged in. The AAA framework …

What is AAA in Cybersecurity? Read More »

What is a Security Operations Centre?

A security operations center (SOC), also called an information security operations center (ISOC), is a command center where information security professionals monitor, detect, analyze, and respond to cyber security incidents. The SOC is more like the hub or central collection point for taking telemetry information across an organization’s IT infrastructure for monitoring, analyzing, detecting, and …

What is a Security Operations Centre? Read More »

WHAT IS ENDPOINT DETECTION AND RESPONSE (EDR)

Endpoint detection and response (EDR), also known as endpoint threat detection and response (ETDR), is a “cyber technology that continually monitors and responds to mitigate cyber threats.” It is an integrated endpoint security solution that is used to detect and investigate and combines real-time continuous monitoring to threats on endpoints devices in response to cyber …

WHAT IS ENDPOINT DETECTION AND RESPONSE (EDR) Read More »

Defense in Depth

Defense in depth also known as layered security, is a cybersecurity strategy used by organizations to secure and safeguard their network, system, and data. The strategy assumes that attackers will try to penetrate the organization’s defenses, so multiple layers of security controls (physical, technical, and administrative) are put in place to detect attackers at every …

Defense in Depth Read More »

National Computer Security Day

Held annually every 30th of November is the National Computer Security Day. A celebration that began in 1988 at a time that computers were becoming commonplace. This Day was created to raise awareness about cyber security issues and ways to keep all electronic devices and data protected from potential threats. Today, the internet and computers …

National Computer Security Day Read More »

Do you own an Apple device? Update it right now

Apple has released a critical software patch to repair a security vulnerability after researchers discovered a security flaw that would allow hackers to infect your Apple devices even if you do nothing, and don’t click on a link. The zero-day attack was discovered by the researchers at the Citizen Lab. The Citizen Lab said the …

Do you own an Apple device? Update it right now Read More »

T-Mobile Data Breach, Over 40 Million People Affected

A cyberattack on T-Mobile has exposed the information of over 40 million people. In a statement issued by the organization, that it had been investigating the data breach since last week when it was “informed of claims made in an online forum that a bad actor had compromised T-Mobile systems.” The company said the stolen files …

T-Mobile Data Breach, Over 40 Million People Affected Read More »

What is OWASP?

The Open Web Application Security Project (OWASP) is a non-profit organization focused on improving the safety of software. It was founded in 2001 by Mark Curphey. OWASP features a range of tools it uses, methodologies, and libraries to see web application security to seek out security vulnerabilities in web applications. They even have documentation guidelines …

What is OWASP? Read More »

How to install Maltego on Windows 10

Maltego is an open-source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks (forensics). Its supports platform like Linux, macOS, and Windows. The Maltego software can be downloaded for free from the official website. On the download page, the newest release versions are available for Windows, Linux, and Mac. As …

How to install Maltego on Windows 10 Read More »