I am pretty sure that most of you came here because of the word "Brute force", which needless to say will be covered in this article, but it is just a minor change in concept which I will be explaining here. So SSH, a protocol that most of us use in one form or the... Continue Reading →
Automating Inventory of Authorized and Unauthorized Software
With this article I intend to help you all to understand not only the importance of the CIS Critical Security Control: Inventory of authorized and unauthorized software, but also the importance of automation. Trust me, automation makes the job easy. But, to do so I want to share my own experience and how I ended... Continue Reading →