How to extract SSL data from any website
With the rise of SSL certificates, markets and tools, new threats have also emerged from the Internet. Today, talking about SSL certificates and SSL encryption has become somewhat normal among web designers, web developers and even simple IT users from other digital markets.
Building and Nurturing Company Culture with a Remote Team
Remote work is on the rise. More and more companies are ditching the idea of a physical office in favor of a fully remote team, especially in cybersecurity and IT in general. But despite the many benefits of working from home and creating your own style of work-life balance, we sometimes forget about the various challenges it brings.
From Scuba and Submarines to DDoS: Diving in with Jose Hernandez from Splunk
After a long day at work, what do you do when you come home? You might catch up on reading the latest tech trends and research, work on learning new programming languages, or any other activities that will advance your career. While this is all helpful for your professional life, having hobbies can be beneficial to every aspect of your life, including your career.
Whois IP: Top 4 tools to perform a WHOIS IP Lookup
Ever since the beginning of the Internet, a key component driving its ongoing progress has been the IP address. That’s right, we’re talking about that magical number behind networks, servers and virtual operating systems.
Rumble Network Discovery: A Powerful Cloud-Based Infosec Mapping Platform
Network discovery is an essential part of both network management and cyber threat intelligence tasks, with the former often conducted by a network or system administrator, and the latter performed by infosec researchers and penetration testers.
Accepting the Irrationality Of Biases in InfoSec: Interview with Kelly Shortridge
The human brain is incredibly complex and powerful, but as with everything powerful, it comes with its own set of limitations. As humans, we’re not always as rational in our decision making as we’d hope to be. It’s unreasonable to think InfoSec professionals are an exception to this rule.
Top 7 IP Scanner Tools for Network Mapping
IP scanning, or IP mapping, is one of the oldest and most traditional tasks performed by people in all types of IT roles, from system administrators and network engineers to security researchers. When you’re working with a company with a large number of connected networks, managing all that IP address allocation could be somewhat tricky.
Social Engineering: What Is It? Types of Social Engineering Attacks and How to Protect Yourself from Them
With human error being the top cause of data breaches¹ in all kinds of organizations, it isn’t surprising that a type of cyber attack that exploits human psychology would be one of the most common threats to enterprise security we see.
Domain Security & Solutions, Part 4: How to Protect your Account at your Registrar
Not all entrepreneurs and developers are truly aware of the implications of losing a domain name. That’s why keeping it secure has to be one of your top priorities when running a company or business with an online presence.
DNS Root Servers: What Are They and Are There Really Only 13?
The Domain Name System is one of the most important internet services in existence, without which we wouldn’t be able to access any online content or even send an email. In fact, every time we try to connect to a website or any other online service, DNS root servers help our computers find and reach the desired addresses.