Threat Hunting: Being Proactive & Automation – Part 1

Threat Hunting: Being Proactive & Automation

Be the hunter, not the prey.

There is very often a fallacy in the world of Cybersecurity that simply implementing various types and kinds of Security Technologies towards the lines of defenses of a business or a corporation will mean greater levels of protection.

While in theory this may be true, but reality often dictates the opposite of this.  For example, by simply deploying various Security tools, you are actually increasing the attack surface for the Cyber attacker.

Read More

An Introduction to Penetration Testing – Part 1

An Introduction to Penetration Testing - Part 1

Understanding the fundamentals of penetration testing and how it applies to your business

In the world of Cyber Security today, there are obviously many technologies out there that one can use fortify the lines of defense for their business or corporation.  To a certain degree, depending upon how well these devices have been deployed and implemented, they should block any malicious traffic coming in into your IT Infrastructure (such as malformed Data Packets, assuming that a combination of Firewalls, Network Intrusion Devices, and Routers are being used).

Read More