Google just published a fourth article om how they implement(ed?) BeyondCorp. Great lessons learned from the creators of the all so fuzzy concept “zero trust”.
Nice read: How Google adopted BeyondCorp: Part 3 (tiered access)
Sharing is caring, or whatever…
General posts, not suited elsewhere.
Google just published a fourth article om how they implement(ed?) BeyondCorp. Great lessons learned from the creators of the all so fuzzy concept “zero trust”.
Nice read: How Google adopted BeyondCorp: Part 3 (tiered access)
To play with, of course. See Kali Nethunter App Store.
From time to time we experience web sites and services are not working properly or is unavailable. To check if it’s me, my network, device, or the service itself I like Downdetector a lot. Based on user reports it is quite accurate and gives you a nice history of events if need be.
The NICE (NICE Cybersecurity Workforce Framework) initiative is lead by NIST as an initiative to boost cybersecurity education. It offers tools to assess and build cybersecurity workforce in organizations, private and government and supports cross-sectoral efforts for information and competancy sharing as utilized by the Japanese, cool! A Japanese government driven Cross-Sectoral Forum picked the NIST Framework to build in-house cybersecurity positions and organisations.
I especially like the reference spreadsheet as it can be used to map work roles required for completeness and the associated relevant knowledge. Further NIST have preliminary work for training plans. Check it out!
Techjunkie made a nice list of the most common temp mails out there:
For reference, there are a lot of platforms to play for free with security preventive tools and techniques as well as vulnerabilities. OWASPs Juice Shop gives lets you play with the Top 10 OWASP risks. PwnAdventure lets you test your skills in hacking games.
OWASP Juice Shop is supposed to be the opposite of a best practice, how great is that! The Pwning Juice Shop book gives you a nice start.
CTFd is a Capture The Flag (CTF) framework that guides you in how to set it all up.
And then you have the common cloud platforms, AWS, Azure, Google Cloud, DigitalOcean etc. to easily set up and test security features on easy-to-deploy infrastructures, platforms and/or applications. Have to mention Heroku, a platform for apps, including Juice Shop as just mentioned.
Talking about cloud, do not miss Twistlock! They also facilitate CTFs, such as the T19 challenge (Docker image).
..Interesting!
Check the new insider build, outlined by Bleepingcomputer.
In november Microsoft and Adobe was offering a set of security updates. Check how ZeroDay Initiative covers it.
Designed and printed this Raspberry Pi and 5″ LCD touch panel case for my to-be portable security box. Keywords: Kali, Forensics, mobile, whitehat, stealth
Last year we published the Digital Forensics book, after a long and exciting, but challenging, period of work. Together with a team of security and forensics professionals we joined forces to create this “complete” book of Digital Forensics. I had the pleasure to write about the forensics process, based on past digital forensics research and practice as a technical analyst. The book aim to provide practitioners of computer science, information security and law enforcements with a fundamental understanding of digital forensics.
Please see our latest blog post for the first chapter of the book here. The book can be found at Wiley or you can buy it straight from Amazon.