Binary analysis is an advanced technique used to work through cyberattacks and malware infestations and is also known as reverse engineering. We show you how to statically analyze binary programs with Binary Ninja, an interactive binary analysis platform.
Threats can be detected and averted at an early stage with crowd security, in which organizations form a community to take concentrated action against cyberattacks by sharing attack data. We explain how this strategy works with the CrowdSec cloud service.
SoftEther is lean VPN software that outpaces the current king of the hill, OpenVPN, in terms of technology and performance.
We look at the role of identity and access management in midmarket organizations.
Zeek offers an arsenal of scripts for monitoring popular network protocols and comes with its own policy scripting language for customization.
Now that web content is encrypted by HTTPS, the underlying name resolution is often unprotected. We look at the classic DNS protocol and investigate whether DNS over HTTPS could be the solution to ensure the confidentiality of DNS requests.
How to deal with threat intelligence on the corporate network when the existing security tools are not effective.
What a user is allowed to do in a program is usually defined by a role model, which often poses numerous challenges, especially in the cloud or for infrastructure as code. The free Open Policy Agent offers a flexible way to manage user rights.
The UDP-based Quick UDP Internet Connections (QUIC) protocol comes with mandatory TLS encryption and promises faster speeds.
Keycloak is a robust and mature project that provides a modern single sign-on authorization experience and centralized authentication of your apps.