Monthly Archives: June 2022

How to Share a Secret (Key), on AWS

AWS Secrets Manager was launched by Amazon Web Services in April 2018. Secrets Manager is an application that you can use with AWS cloud accounts to store, retrieve and retrieve credentials – all via API or AWS Command Line Interface. … Continue reading

Posted in Uncategorized | Leave a comment

How to secure your PowerShell

PowerShell is an extremely powerful tool that can do incredible things in IT Infrastructure automation. It can also be misused for malicious purposes, which could lead to real damage to our environment. PowerShell security helps to minimize such risks, mainly … Continue reading

Posted in Uncategorized | Leave a comment

How to Prevent Credential Stuffing Attacks

Online, terms like data breaches, brute force attacks and cybersecurity are part of our everyday vocabulary. Credential stuffing is a term that may be less common outside the cybersecurity community. Data breaches that are well-publicized quickly make the top news, … Continue reading

Posted in Uncategorized | Leave a comment

How to Prepare for the OSCP

The information security market is still volatile. We’ve heard about a disturbing trend for years, with survey after survey reporting the exact same thing: a severe shortage of qualified, skilled talent to fill mission-critical roles. This should make your ears … Continue reading

Posted in Uncategorized | Leave a comment

How to Prepare for the OSCP With the OWASP

Injections are a crucial vulnerability that every student of the OSCP must be aware of. We covered this vulnerability in a previous article. This category of vulns can be used by hackers in many ways, including SQL injections, command injections, … Continue reading

Posted in Uncategorized | Leave a comment

How to prepare for a Capture the Flag Hacking Competition

Hacking is not like the movies. Your motley crew is there to support you when you face off against a worthy adversary. Most security jobs are boring, and you probably want them that way. Audit. Find vulnerabilities. Patch. Rinse and … Continue reading

Posted in Uncategorized | Leave a comment

How to plan your Microsoft Exchange 2016 Setup

Despite the rise of collaboration services, video conferencing, and social media, email remains the most important communication tool for organizations. Imagine what happens if email service is interrupted. Customers don’t receive order confirmation emails, sales can’t send proposals to prospects … Continue reading

Posted in Uncategorized | Leave a comment

How to choose the right AWS Storage Service for Your Organization

In recent years, anyone with large storage requirements has likely considered the cloud. Cloud storage is not as simple as we would like. Each AWS storage service offers its own unique features and pitfalls, while reducing costs. It can be … Continue reading

Posted in Uncategorized | Leave a comment

How to Pass the Palo Alto PCNSE Exam

The highly sought-after certification of Palo Alto Networks’ Certified Network Security Engineer is PCNSE. It certifies that candidates are able to design, install and configure security systems for Palo Alto Networks. Security engineers, pre-sales engineers, and system integrators typically hold … Continue reading

Posted in Uncategorized | Leave a comment

How to move from Azure DevOps into GitHub Actions

Azure DevOps is one of the most widely used CICD solutions in DevOps. It’s even very popular outside of the Microsoft realm. Many organizations use AWS and Azure DevOps to manage their CICD solutions. It’s fast, robust and fully hosted … Continue reading

Posted in Uncategorized | Leave a comment