Proofpoint Wombat Security Awareness Training – Phishing Campaign Step by Step
Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on fighting phishing…
Learning, Sharing, Creating
Wombat ThreatSim® Phishing Simulations are an excellent addition to any security awareness training program, particularly those focused on fighting phishing…
1. Ubuntu16.04 Installation 1.1 VMware Workstation Virtual Machine Creation for not easy installation If you are using VMware workstation ,…
For many IT workers remotely involved with networking, it is quite common to need to expose your Intranet application to…
Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks.…
Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs)…
ArcSight Logger is one of products from Micro Focus SIEM platform. It streams real-time data and categorizes them into specific…
Networking Scapy: send, sniff and dissect and forge network packets. Usable interactively or as a library pypcap, Pcapy and pylibpcap: several different Python bindings…
One of the most recent and wide-ranging laws impacting the security profession globally is the European Union’s General Data Protection…
When cyber security professionals talking about related frameworks, it always comes to two which is ISO and NIST. There are…
Enterprise Security Architecture (ESA) is a relatively new concept to most business & IT stakeholders. However it is gaining an…
A Brief History of Enterprise Architecture (From Arnab Chattopadhaya ‘s Enterprise Security Architecture) Enterprise Architectural Methodologies • Consortia-developed Frameworks – ISO…