PinnedSQL Injection: Beginner’s guideUse cases to understand SQLi better Use-case 1: Bypassing a LoginSep 3Sep 3
Introduction to SIEM and SOARCost-efficiency by reducing the financial impact of security breaches, which can average $3.4 million per incidentFeb 8Feb 8
IT Risk Assessment : A beginner’s guideRisk rankings: According to a template in “NIST guide for conducting risk assessments”, the severity of following categories have to be…Jan 22Jan 22
Threat Modelling and STRIDE methodologySTRIDE, an acronym representing Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege…Jan 19Jan 19
Social Engineering 101: Navigating the EssentialsPhishing is the deceptive practice of sending communications across multiple channels, such as social media, text messages, and phone…Jan 18Jan 18
NZISM and Zero Trust PolicyIn a Zero Trust environment, the mantra is “never trust, always verify.” This approach mandates continuous verification of the identity andJan 17Jan 17