Microsoft Defender for Endpoint Configurations and Training Resources
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond…
Learning, Sharing, Creating
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond…
Gartner defines the Application Security Testing (AST) market as the buyers and sellers of products and services designed to analyze…
The Open Web Application Security Project (OWASP) is a non-profit organization dedicated to providing unbiased, practical information about application security. …
Pi-hole or Pihole is a Linux network-level advertisement and Internet tracker blocking application[2][3][4][5] which acts as a DNS sinkhole[6] and optionally a DHCP server, intended for use on a private network.[1] It…
With McAfee ePO software, IT administrators can unify security management across endpoints, networks, data, and compliance solutions from McAfee and…
Github Project address: https://github.com/51sec/camera Camera Project Description This project is used to demonstrate how easy a web app can use your…
Adblock software in OpenWRT is a script running in your OpenWRT gateway to sort out those DNS queries that ask…
Thanks to IT Governance. It has compiled Cyber Attacks and Data Breaches list by month and year since 2014, might be…
Here are some experiences while using DarkTrace. I am putting them together as a note for myself.
Gartner defines the privileged access management (PAM) market as tools that “discover, manage and govern privileged accounts on multiple systems…
Today’s businesses require secure 24/7 access to their cloud applications and data, and require more than Web Single Sign-On to…
The Solution CyberArk Endpoint Privilege Manager helps remove the barriers to enforcing least privilege and allows organizations to block and…