Cloud & Platform Security 12/July/2023 The importance of establishing new perimeters surrounding the cloud The addition of Single Points of Access (SOPs) for AWS aims to reduce vulnerability exploitation by using administrative users in AWS
Network Security 15/June/2023 The importance of a good configuration of IPv6 rules in the firewall The importance of a good IPv6 firewall rule configuration is related to the need to protect an organization's network against potential vulnerabilities and attacks that may exploit the specific characteristics of the IPv6 protocol
Corporate Security 24/November/2022 The dangers of Shadow It – and CASB’s role in protecting the environment There was a time when people considered that data would always be safe behind applications, which were considered to be heavily protected
Web Application Security 31/December/2020 Server Side Request Forgery — Attack and Defense Also known as SSRF, is a vulnerability that allows an attacker to make requests through a vulnerable server
Cloud & Platform Security 12/July/2023 The importance of establishing new perimeters surrounding the cloud The addition of Single Points of Access (SOPs) for AWS aims to reduce vulnerability exploitation by using administrative users in AWS
Network Security 15/June/2023 The importance of a good configuration of IPv6 rules in the firewall The importance of a good IPv6 firewall rule configuration is related to the need to protect an organization's network against potential vulnerabilities and attacks that may exploit the specific characteristics of the IPv6 protocol
Corporate Security 24/November/2022 The dangers of Shadow It – and CASB’s role in protecting the environment There was a time when people considered that data would always be safe behind applications, which were considered to be heavily protected
Web Application Security 31/December/2020 Server Side Request Forgery — Attack and Defense Also known as SSRF, is a vulnerability that allows an attacker to make requests through a vulnerable server