Aug 2, 20233 min readHow Automatic Pentesting Can Help Prevent Data LeaksIntroduction: Data leaks are a major security concern for businesses of all sizes. In 2022, there were over 450,000 data breaches...
May 9, 20232 min readLog4j Vulnerability: The Persistent Threat Amplified by Widespread Usage in Programming LibrariesLog4j Vulnerability
Dec 13, 20211 min readWhat is an attack surface and why you should care!The combination of all the weak points found in a network environment that an attacker could use to penetrate or even extract information...
Dec 8, 20211 min readIs Cybersecurity an expense or an investment?Investing means owning an asset or an item with the goal of generating income from the investment or from the appreciation of your...
Dec 3, 20211 min readWhat is a CVE and why is it important?The Common Vulnerabilities and Exposures (CVE) system provides a benchmark method for publicly known information security vulnerabilities...
Dec 2, 20212 min readWhen should my company perform a pentest?A penetration test, is an authorized simulated cyber attack on a computer system, performed to assess the security of the system. The UK...