This might be a a little out there on the internet but even today a lot of us are not aware of the smallest measures one can implement to secure themselves from the various red team attacks. Sometimes its the smallest of things that we overlook end up getting us compromised. The whole idea of... Continue Reading →
Automating Inventory of Authorized and Unauthorized Software
With this article I intend to help you all to understand not only the importance of the CIS Critical Security Control: Inventory of authorized and unauthorized software, but also the importance of automation. Trust me, automation makes the job easy. But, to do so I want to share my own experience and how I ended... Continue Reading →