Blog

30 Articles
ICTKB-IMG

Undo sent email in GMAIL

We’ve all accidentally sent an email too early, without a specific attachment, or to the wrong address. It can be devastating. Regardless of how it happened, an accidental email can make you seem too eager, too rushed, or worse. Finally, there is...

ICTKB_IMG

Keeping Your Stuff Safe Online – Password Security

In today’s world, where we do so much online, having strong passwords is super important. They’re like the locks on the doors of your online accounts, keeping out bad guys who might try to steal your stuff. Passwords serve as the primary...

ICTKB_IMG

Cyber Kill Chain Process & Purpose

The Cyber Kill Chain offers a comprehensive framework as a part of the Intelligence Driven Defense model. In this article, we will discuss what the cyber kill chain is and what its steps are. Cyber intrusions are the worst nightmare of many of us....

ICTKB_IMG

Network Packet Broker

A Network Packet Broker (NPB) resides between taps and SPAN ports. They can access network data and sophisticated security and monitoring tools that typically reside in data centers. NPB’s do just what their name says: they break network packet...

ICTKB_IMG

Shadow IT : Definition, Risk & Mitigation

Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval. It has grown exponentially in recent years with the adoption of cloud-based applications and...

ICTKB_IMG

SD-WAN vs. MPLS

SD-WAN (Software-Defined Wide Area Network) and MPLS (Multiprotocol Label Switching) are both types of networking technology used to connect remote networks, but they have some key differences. Multiprotocol Label Switching (MPLS) is a technology...

ICTKB_IMG

Command and Control (C2)

Malicious network attacks have been on the rise in the last decade. One of the most damaging attacks, often executed over DNS, is accomplished through command and control (C2). Command-and-control attacks can compromise an entire network. The...

ICTKB_IMG

OWASP Top 10

The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. Companies should adopt this document and start the process of...

Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.