自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

Cyber Security Memo

Focusing on Cyber Security Topics on Internet

  • 博客(30)
  • 收藏
  • 关注

原创 Threat Hunting Tools

(adsbygoogle = window.adsbygoogle || []).push({});Here are some collections from Internet about Threat Hunting tools, information and resources.1. KansaGitHub – Davehull/Kansahttp://tr...

2019-01-30 22:48:02 180

原创 Threat Hunting Tools

Last updated on August 9, 2019 Here are some collections from Internet about Threat Hunting tools, information and resources.1. KansaGitHub – Davehull/Kansahttp://trustedsignal.blogspot.com/sear...

2019-01-30 06:45:17 551

原创 Expose your local service to public: Ngrok, FRP, localtunnel

(adsbygoogle = window.adsbygoogle || []).push({});For many IT workers remotely involved with networking, it is quite common to need to expose your Intranet application to the outside world...

2019-01-17 23:40:05 274

原创 Proofpoint Wombat Security Awareness Training – Phishing Campaign Step by Step

Last updated on August 9, 2019 Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on fighting phishing attacks. W...

2019-01-17 18:43:26 108

原创 Ubuntu 16.04.5 LTS (Xenial Xerus) Installation Step by Step in VMWare Workstation (Not Easy Installa...

(adsbygoogle = window.adsbygoogle || []).push({});1. Ubuntu16.04 Installation1.1 VMware Workstation Virtual Machine Creation for not easy installationIf you are using VMware worksta...

2019-01-17 10:32:15 58

原创 Ubuntu 16.04.5 LTS (Xenial Xerus) Installation Step by Step in VMWare Workstation (Not Easy Installa...

Last updated on August 9, 2019 1. Ubuntu16.04 Installation1.1 VMware Workstation Virtual Machine Creation for not easy installationIf you are using VMware workstation , by default, system wil...

2019-01-17 07:05:18 86

原创 Expose your local service to public: Ngrok, FRP, localtunnel

Last updated on August 9, 2019 For many IT workers remotely involved with networking, it is quite common to need to expose your Intranet application to the outside world in a secured manner. Unfortu...

2019-01-17 03:15:55 342

原创 Proofpoint Wombat Security Awareness Training – Phishing Campaign Step by Step

(adsbygoogle = window.adsbygoogle || []).push({});Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on...

2019-01-17 02:44:17 103

原创 Gartner Magic Quadrant for SIEM Products (2018,2017,2016,2015,2014,2013,2012,2011…)

Last updated on August 9, 2019 Gartner defines SIEM as a technology that aggregates data produced by security devices, network infrastructure and systems, and applications. Products in the security ...

2019-01-11 13:15:08 234

原创 Gartner Magic Quadrant for SIEM Products (2018,2017,2016,2015,2014,2013,2012,2011…)

(adsbygoogle = window.adsbygoogle || []).push({});Gartner defines SIEM as a technology that aggregates data produced by security devices, network infrastructure and systems, and applicatio...

2019-01-11 11:13:26 154

原创 Gartner Magic Quadrant for Enterprise Network Firewall (2018,2017,2016,2015,2014,2013,2011,2010)

(adsbygoogle = window.adsbygoogle || []).push({});Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise...

2019-01-11 07:57:16 367

原创 Gartner Magic Quadrant for Enterprise Network Firewall (2018,2017,2016,2015,2014,2013,2011,2010)

Last updated on August 9, 2019 Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products...

2019-01-11 03:49:29 546

原创 Gartner Magic Quadrant for Unified Threat Management (2018,2017,2016,2015,2014,2013,2012,…)

Last updated on August 9, 2019 Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees)....

2019-01-10 23:50:06 289

原创 Best Free Network Performance Test tool – Iperf

Last updated on August 9, 2019 According to wikipedia Iperf “is a commonly used network testing tool that can create TCP and UDP data streams and measure the throughput of a network that is carryi...

2019-01-10 21:31:42 79

原创 Gartner Magic Quadrant for Unified Threat Management (2018,2017,2016,2015,2014,2013,2012,…)

(adsbygoogle = window.adsbygoogle || []).push({});Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses ...

2019-01-10 17:40:52 232

原创 Best Free Network Performance Test tool – Iperf

(adsbygoogle = window.adsbygoogle || []).push({});According to wikipedia Iperf “is a commonly used network testing tool that can create TCP and UDP data streams and measure the throughpu...

2019-01-10 16:01:16 124

原创 Python Cyber Security Testing Tool Collection

Last updated on August 9, 2019 NetworkingScapy:send, sniff and dissect and forge network packets. Usable interactively or as a librarypypcap,Pcapyandpylibpcap: several different Python bindin...

2019-01-08 22:55:53 143

原创 ArcSight SIEM Logger Web, Search Examples, Use Case Reports

Last updated on August 9, 2019 ArcSight Logger is one of products from Micro Focus SIEM platform. It streams real-time data and categorizes them into specific logs and easily integrates with Securi...

2019-01-08 20:53:21 120

原创 Cyber Security Frameworks and Integrated with TOGAF

Last updated on August 9, 2019 When cyber security professionals talking about related frameworks, it always comes to two which is ISO and NIST. There are lots of confusions between them and also b...

2019-01-08 19:47:37 398

原创 Python Cyber Security Testing Tool Collection

(adsbygoogle = window.adsbygoogle || []).push({});NetworkingScapy:send, sniff and dissect and forge network packets. Usable interactively or as a librarypypcap,Pcapyandpylibpcap: se...

2019-01-08 15:32:12 100

原创 ArcSight SIEM Logger Web, Search Examples, Use Case Reports

(adsbygoogle = window.adsbygoogle || []).push({});ArcSight Logger is one of products from Micro Focus SIEM platform. It streams real-time data and categorizes them into specific logs and ...

2019-01-08 14:53:12 84

原创 Understanding GDPR from Security Professional’s Perspective

(adsbygoogle = window.adsbygoogle || []).push({});One of the most recent and wide-ranging laws impacting the security profession globally is the European Union’s General Data Protection Re...

2019-01-08 11:08:57 51

原创 From DevOps to DevSecOps

Last updated on August 9, 2019 What is DevOps:DevOpsis the combination ofcultural philosophies,practices, andtoolsthat increases an organization’s ability to deliver applications and services ...

2019-01-08 09:55:30 88

原创 Enterprise Security Architecture Resources

(adsbygoogle = window.adsbygoogle || []).push({});Enterprise Security Architecture (ESA) is a relatively new concept to most business & IT stakeholders. However it is gaining an incre...

2019-01-08 09:25:04 101

原创 EA (Enterprise Architecture) Framework Resources

(adsbygoogle = window.adsbygoogle || []).push({});A Brief History of Enterprise Architecture(From Arnab Chattopadhaya ‘sEnterprise Security Architecture)Enterprise Architectural Metho...

2019-01-08 07:09:01 111

原创 From DevOps to DevSecOps

(adsbygoogle = window.adsbygoogle || []).push({});What is DevOps:DevOpsis the combination ofcultural philosophies,practices, andtoolsthat increases an organization’s ability to deliv...

2019-01-08 07:05:29 91

原创 EA (Enterprise Architecture) Framework Resources

Last updated on August 9, 2019 A Brief History of Enterprise Architecture(From Arnab Chattopadhaya ‘sEnterprise Security Architecture)Enterprise Architectural Methodologies• Consortia-develope...

2019-01-08 05:08:10 317

原创 Cyber Security Frameworks and Integrated with TOGAF

(adsbygoogle = window.adsbygoogle || []).push({});When cyber security professionals talking about related frameworks, it always comes to two which is ISO and NIST. There are lots of confus...

2019-01-08 04:54:37 421

原创 Understanding GDPR from Security Professional’s Perspective

Last updated on August 9, 2019 One of the most recent and wide-ranging laws impacting the security profession globally is the European Union’s General Data Protection Regulation, or GDPR. As of May ...

2019-01-08 04:09:15 107

原创 Enterprise Security Architecture Resources

Last updated on August 9, 2019 Enterprise Security Architecture (ESA) is a relatively new concept to most business & IT stakeholders. However it is gaining an increase in adoption due to the nee...

2019-01-08 00:12:44 270

空空如也

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除