You got a CNAPP, now what?

So, you finally deployed a Cloud-Native Application Protection Platform (CNAPP). It feels like a big win, right? Your dashboard is now overflowing with alerts: misconfigurations, open ports, IAM disasters just waiting to be exploited. But here’s the real kicker – an alert without action is just an expensive way to watch your cloud burn in slow… Continue reading

Book Review : Hands-on Red Team Tactics

  Book Details: Authors: Himanshu Sharma & Harpreet Singh ISBN: 9781788995238 Publisher: PacktPub The red teaming concept has existed since the 6th century BCE when the ancient military genius Sun Tzu stated that “…one who knows the enemy and knows himself will not be endangered in a hundred engagements.”.  Today, red teaming concepts continue to evolve… Continue reading

Low-Cost Honeypots as Enterprise Defense Mechanism

Since the launch of Fred Cohens’ Deception Toolkit in 1998 (First publically released Honeypot), Honeypots has been a proven useful method for attack detection and analysis. As these honeypots are complex in installation and require high maintenance, they are yet to get their proper place in enterprise security suits. However, the honeypot technology has been… Continue reading

Digital Forensics and Incident Response (DFIR) using Docker

With the increasing popularity of container virtualization technology Now it has become imperative for forensics professionals to implement “Docker” technology in Digital Forensics and Incident Response operations to reduce a headache reconfiguring set up every time for different cases and increase productivity, One aspect of the using Docker for DFIR operations is providing Docker images… Continue reading