- 博客(30)
- 收藏
- 关注
原创 Threat Hunting Tools
(adsbygoogle = window.adsbygoogle || []).push({});Here are some collections from Internet about Threat Hunting tools, information and resources.1. KansaGitHub – Davehull/Kansahttp://tr...
2019-01-30 22:48:02 180
原创 Threat Hunting Tools
Last updated on August 9, 2019 Here are some collections from Internet about Threat Hunting tools, information and resources.1. KansaGitHub – Davehull/Kansahttp://trustedsignal.blogspot.com/sear...
2019-01-30 06:45:17 551
原创 Expose your local service to public: Ngrok, FRP, localtunnel
(adsbygoogle = window.adsbygoogle || []).push({});For many IT workers remotely involved with networking, it is quite common to need to expose your Intranet application to the outside world...
2019-01-17 23:40:05 274
原创 Proofpoint Wombat Security Awareness Training – Phishing Campaign Step by Step
Last updated on August 9, 2019 Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on fighting phishing attacks. W...
2019-01-17 18:43:26 108
原创 Ubuntu 16.04.5 LTS (Xenial Xerus) Installation Step by Step in VMWare Workstation (Not Easy Installa...
(adsbygoogle = window.adsbygoogle || []).push({});1. Ubuntu16.04 Installation1.1 VMware Workstation Virtual Machine Creation for not easy installationIf you are using VMware worksta...
2019-01-17 10:32:15 58
原创 Ubuntu 16.04.5 LTS (Xenial Xerus) Installation Step by Step in VMWare Workstation (Not Easy Installa...
Last updated on August 9, 2019 1. Ubuntu16.04 Installation1.1 VMware Workstation Virtual Machine Creation for not easy installationIf you are using VMware workstation , by default, system wil...
2019-01-17 07:05:18 86
原创 Expose your local service to public: Ngrok, FRP, localtunnel
Last updated on August 9, 2019 For many IT workers remotely involved with networking, it is quite common to need to expose your Intranet application to the outside world in a secured manner. Unfortu...
2019-01-17 03:15:55 342
原创 Proofpoint Wombat Security Awareness Training – Phishing Campaign Step by Step
(adsbygoogle = window.adsbygoogle || []).push({});Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on...
2019-01-17 02:44:17 103
原创 Gartner Magic Quadrant for SIEM Products (2018,2017,2016,2015,2014,2013,2012,2011…)
Last updated on August 9, 2019 Gartner defines SIEM as a technology that aggregates data produced by security devices, network infrastructure and systems, and applications. Products in the security ...
2019-01-11 13:15:08 234
原创 Gartner Magic Quadrant for SIEM Products (2018,2017,2016,2015,2014,2013,2012,2011…)
(adsbygoogle = window.adsbygoogle || []).push({});Gartner defines SIEM as a technology that aggregates data produced by security devices, network infrastructure and systems, and applicatio...
2019-01-11 11:13:26 154
原创 Gartner Magic Quadrant for Enterprise Network Firewall (2018,2017,2016,2015,2014,2013,2011,2010)
(adsbygoogle = window.adsbygoogle || []).push({});Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise...
2019-01-11 07:57:16 367
原创 Gartner Magic Quadrant for Enterprise Network Firewall (2018,2017,2016,2015,2014,2013,2011,2010)
Last updated on August 9, 2019 Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products...
2019-01-11 03:49:29 546
原创 Gartner Magic Quadrant for Unified Threat Management (2018,2017,2016,2015,2014,2013,2012,…)
Last updated on August 9, 2019 Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees)....
2019-01-10 23:50:06 289
原创 Best Free Network Performance Test tool – Iperf
Last updated on August 9, 2019 According to wikipedia Iperf “is a commonly used network testing tool that can create TCP and UDP data streams and measure the throughput of a network that is carryi...
2019-01-10 21:31:42 79
原创 Gartner Magic Quadrant for Unified Threat Management (2018,2017,2016,2015,2014,2013,2012,…)
(adsbygoogle = window.adsbygoogle || []).push({});Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses ...
2019-01-10 17:40:52 232
原创 Best Free Network Performance Test tool – Iperf
(adsbygoogle = window.adsbygoogle || []).push({});According to wikipedia Iperf “is a commonly used network testing tool that can create TCP and UDP data streams and measure the throughpu...
2019-01-10 16:01:16 124
原创 Python Cyber Security Testing Tool Collection
Last updated on August 9, 2019 NetworkingScapy:send, sniff and dissect and forge network packets. Usable interactively or as a librarypypcap,Pcapyandpylibpcap: several different Python bindin...
2019-01-08 22:55:53 143
原创 ArcSight SIEM Logger Web, Search Examples, Use Case Reports
Last updated on August 9, 2019 ArcSight Logger is one of products from Micro Focus SIEM platform. It streams real-time data and categorizes them into specific logs and easily integrates with Securi...
2019-01-08 20:53:21 120
原创 Cyber Security Frameworks and Integrated with TOGAF
Last updated on August 9, 2019 When cyber security professionals talking about related frameworks, it always comes to two which is ISO and NIST. There are lots of confusions between them and also b...
2019-01-08 19:47:37 398
原创 Python Cyber Security Testing Tool Collection
(adsbygoogle = window.adsbygoogle || []).push({});NetworkingScapy:send, sniff and dissect and forge network packets. Usable interactively or as a librarypypcap,Pcapyandpylibpcap: se...
2019-01-08 15:32:12 100
原创 ArcSight SIEM Logger Web, Search Examples, Use Case Reports
(adsbygoogle = window.adsbygoogle || []).push({});ArcSight Logger is one of products from Micro Focus SIEM platform. It streams real-time data and categorizes them into specific logs and ...
2019-01-08 14:53:12 84
原创 Understanding GDPR from Security Professional’s Perspective
(adsbygoogle = window.adsbygoogle || []).push({});One of the most recent and wide-ranging laws impacting the security profession globally is the European Union’s General Data Protection Re...
2019-01-08 11:08:57 51
原创 From DevOps to DevSecOps
Last updated on August 9, 2019 What is DevOps:DevOpsis the combination ofcultural philosophies,practices, andtoolsthat increases an organization’s ability to deliver applications and services ...
2019-01-08 09:55:30 88
原创 Enterprise Security Architecture Resources
(adsbygoogle = window.adsbygoogle || []).push({});Enterprise Security Architecture (ESA) is a relatively new concept to most business & IT stakeholders. However it is gaining an incre...
2019-01-08 09:25:04 101
原创 EA (Enterprise Architecture) Framework Resources
(adsbygoogle = window.adsbygoogle || []).push({});A Brief History of Enterprise Architecture(From Arnab Chattopadhaya ‘sEnterprise Security Architecture)Enterprise Architectural Metho...
2019-01-08 07:09:01 111
原创 From DevOps to DevSecOps
(adsbygoogle = window.adsbygoogle || []).push({});What is DevOps:DevOpsis the combination ofcultural philosophies,practices, andtoolsthat increases an organization’s ability to deliv...
2019-01-08 07:05:29 91
原创 EA (Enterprise Architecture) Framework Resources
Last updated on August 9, 2019 A Brief History of Enterprise Architecture(From Arnab Chattopadhaya ‘sEnterprise Security Architecture)Enterprise Architectural Methodologies• Consortia-develope...
2019-01-08 05:08:10 317
原创 Cyber Security Frameworks and Integrated with TOGAF
(adsbygoogle = window.adsbygoogle || []).push({});When cyber security professionals talking about related frameworks, it always comes to two which is ISO and NIST. There are lots of confus...
2019-01-08 04:54:37 421
原创 Understanding GDPR from Security Professional’s Perspective
Last updated on August 9, 2019 One of the most recent and wide-ranging laws impacting the security profession globally is the European Union’s General Data Protection Regulation, or GDPR. As of May ...
2019-01-08 04:09:15 107
原创 Enterprise Security Architecture Resources
Last updated on August 9, 2019 Enterprise Security Architecture (ESA) is a relatively new concept to most business & IT stakeholders. However it is gaining an increase in adoption due to the nee...
2019-01-08 00:12:44 270
空空如也
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人