Using Shodan during Security Operations

Using Shodan during Security Operations

[vc_row][vc_column][vc_wp_text] [xyz-ips snippet=”metadatatitle”] [/vc_wp_text][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_column_text] What is Shodan? Shodan is a search engine that finds devices and device types...
Attacking Azure & Azure AD, Part II

Attacking Azure & Azure AD, Part II

[vc_row][vc_column][vc_wp_text] [xyz-ips snippet=”metadatatitle”] [/vc_wp_text][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_column_text] Abstract When I published my first article, Attacking Azure & Azure AD and...
Elasticsearch and Industrial Big Data

Elasticsearch and Industrial Big Data

[vc_row][vc_column][vc_wp_text] [xyz-ips snippet=”metadatatitle”] [/vc_wp_text][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_column_text] To date, most industrial process data is fed to proprietary SCADA systems that...
Making the most of XG Firewall v18 – Part 1

Making the most of XG Firewall v18 – Part 1

[vc_row][vc_column][vc_wp_text] [xyz-ips snippet=”metadatatitle”] [/vc_wp_text][vc_empty_space][/vc_column][/vc_row][vc_row][vc_column width=”2/3″][vc_column_text] Xstream architecture, DPI engine, and TLS inspection XG Firewall v18 MR1 is now...

Pin It on Pinterest