Feb
05
One of the first things to consider when deploying a new firewall (and any other network device) into the network is secure administrative access. If management access is not secured properly, you can’t really use your firewall to detect and defend against vulnerability exploits that could lead to infiltration and/or the loss of sensitive data. Read More
Feb
02
In the conclusion of the Fingerprinting section of our Pentesting 101 series we cover hiding while fingerprinting. Need to catch up? Check out our entire Pentesting 101 series here.  Read More
Jan
12
So far in the introduction to penetration testing series of articles, we have covered non-intrusive ways of gathering intelligence on a target network. Using Technical and Human OSINT helped create a picture of the target network that is subject to a penetration test through unobtrusive means. If you’re just joining us in this series, we define Technical OSINT as gathering technical data on a target network through tools and web searches. Human OSINT is gathering data on the human aspect of the... Read More
Nov
04
HONEST Security’s Amber Holcomb discusses innovations in Internet of Things connected devices and how to keep IoT safe from cyber criminals. Amber Holcomb is Director of Operations at HONEST Security. She is passionate about encouraging and supporting young women in STEM and empowering women in the tech industry.  Read More
Oct
22
Today’s breaches continue to start with compromised email accounts, with monetary gain remaining the top motivation for stealing login credentials. Typically, these are opportunistic attacks, a sort of spray and pray tactic. According to ProofPoint’s report Human Factor 2019, 25% of phishing emails in 2018 were generic credential harvesting. Phishing is the number one attack vector, mainly because social engineering is still a wildly successful way to compromise users because so many people... Read More
Aug
20
Most employees connect their personal cell phone to company networks. Here's what businesses need to know about mobile application security. Author: Esraa Alshammari Read More
Dec
04
As architects, it's our responsibility to help customers understand how to protect their data and environmental infrastructure after their service has been provisioned. This includes applications, data content, virtual machines, access credentials, and compliance issue requirements. Read More
Sep
18
The primary goal of security is to provide confidentiality, integrity, and availability. In this blog post, we'll define what the CIA Triad is and why security controls are evaluated against it. I'll also demonstrate how you can achieve confidentiality and high-availability using Microsoft Azure's public cloud infrastructure. Read More
Jul
30
INE instructor Piotr Kaluzny introduces students to Cisco TrustSec, demonstrating the benefits of the technology and how to best utilize it. Read More
Jul
25
Cryptography is used EVERYWHERE security is employed. But what are the underlying tools that make Cryptography possible? Read More

Subscribe to INE Blog Updates

New Blog Posts!