Top 13 Online Vulnerability Scanning Tools
Web apps and vulnerabilities go hand-in-hand. The best thing you can do is to not only patch vulnerabilities when your programmers find one, or when a third party cybersecurity company notifies you, but to also act in a proactive way—by setting up your own scheduled vulnerability scans.
Know your attacker: Speaking with Josh Kamdjou from Sublime Security
We’re all aware of the age-old debate among those in cybersecurity circles about who’s better, red team or blue team? The lighthearted “animosity” between red and blue teams can be fun, but the truth is, there is no benefit to picking sides, as both ultimately have the same goal — preventing cyber crimes.
How to generate & download custom subdomain lists
We’re back with new updates to our product SurfaceBrowser™.
WHOIS Lookup: The Hidden Key in Domain Infosec Investigations
It encompasses millions of users on the Internet. And it doesn’t matter if you’re a web designer, the owner of a car company, a photographer, a fast food restaurant manager, or any kind of business owner — you’re part of it even if you don’t know it.
Bringing Cybersecurity into Academia: We Talk with Patrik Hudak
The rise of cyberthreats, in both scale and technique, has brought an increased attention to and demand for cybersecurity. However, academia and the publication of academic papers, struggle to keep up with the frequent shifts in trends and methods. Coupled with the fact that many people interested in cybersecurity are working professionals who may not have the time to read more lengthy academic papers, we are seeing more people turn to conference papers and blog posts for this information.