Cybersecurity Fingerprinting Techniques and OS-Network Fingerprint Tools
In the physical world, analyzing fingerprints is one of the most popular techniques used to identify people involved with all types of crimes, from robbery to kidnapping or even murder.
Cybersecurity Experts Interview Series Recap
Today we are recapping our interview series we started back in February, and all the great people we’ve had the chance to talk to.
Attack Surface: Concept, Types, Tools and Attack Surface Reduction Strategies
A while back we talked about the concept of OSINT, and how important it is to the infosec industry.
How Stack Overflow kick-started an entire business: Talking with Ben Dowling from IPinfo
When you have a programming question, Stack Overflow is one of the, if not the, best place to go. Developers of all types have been turning to Stack Overflow’s community for assistance since 2008.
Top 20 and 200 most scanned ports in the cybersecurity industry
Port scanning is one of the most common activities in cybersecurity — and it’s performed by both sides, the red team and the blue team.
It's never been easier to make a great product: A chat with Johannes Gilger from Urlscan.io
Since the dawn of the Internet, people dreamed of starting their own online business, though few truly succeeded in that task. With all of the technology and services available today, becoming an entrepreneur seems easier than ever before.