SecurityTrails Blog

Risk Assessment vs. Risk Analysis vs. Risk Management: When Being Optimistic Isn't Ideal.
SecurityTrails Blog · Aug 25 2020 · by Sara Jelen

Risk Assessment vs. Risk Analysis vs. Risk Management: When Being Optimistic Isn’t Ideal

Life is about taking risks. Business is about taking risks. Heck, anything you do involves taking risks. But you wouldn’t jump right off a cliff into unknown waters, would you? You’d want to know: How deep is the water? Are there sharks? Is there anyone around you who could help if you needed it? Are you even ready to make the jump?

Insider Threats in Cybersecurity: The Enemy Comes From Within.
SecurityTrails Blog · Aug 18 2020 · by Sara Jelen

Insider Threats in Cybersecurity: The Enemy Comes From Within

People, process, and technology are the pillars of cybersecurity. And while people are every organization’s best asset, they are also its biggest weakness. Security technology continuously evolves to counter emerging security threats and new techniques, but there is one threat that can’t be thwarted by merely employing new tools and processes. The biggest security threats of today are not the result of malicious attackers, advanced persistent threats, or malware. They come from within.

Recon-ng: An Open Source Reconnaissance Tool.
SecurityTrails Blog · Aug 13 2020 · by Nicolas Pence

Recon-ng: An Open Source Reconnaissance Tool

The OSINT tools arsenal is now filled with more pieces of code that help “get things done” better, faster and more effectively than ever before. And Recon-ng, with its modular design, brings you a familiar way to operate a command line while its similar syntax to the Metasploit framework allows you to mount different purpose modules and configure them independently.