Blog

35 Articles
ICTKB_IMG

Network Packet Broker

A Network Packet Broker (NPB) resides between taps and SPAN ports. They can access network data and sophisticated security and monitoring tools that typically reside in data centers. NPB’s do just what their name says: they break network packet...

ICTKB_IMG

Shadow IT : Definition, Risk & Mitigation

Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval. It has grown exponentially in recent years with the adoption of cloud-based applications and...

ICTKB_IMG

SD-WAN vs. MPLS

SD-WAN (Software-Defined Wide Area Network) and MPLS (Multiprotocol Label Switching) are both types of networking technology used to connect remote networks, but they have some key differences. Multiprotocol Label Switching (MPLS) is a technology...

ICTKB_IMG

Command and Control (C2)

Malicious network attacks have been on the rise in the last decade. One of the most damaging attacks, often executed over DNS, is accomplished through command and control (C2). Command-and-control attacks can compromise an entire network. The...

ICTKB_IMG

OWASP Top 10

The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. Companies should adopt this document and start the process of...

ICTKB_IMG

Blockchain Technology

Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network. An asset can be tangible (a house, car, cash, land) or intangible (intellectual property, patents, copyrights,...

ICTKB_IMG

Computer Processor 32 Bit vs. 64 Bit

When it comes to computers, the difference between 32-bit and a 64-bit is all about processing power. Computers with 32-bit processors are older, slower, and less secure, while a 64-bit processor is newer, faster, and more secure. But what do the...

ICTKB_IMG

What is Botnet Attack

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker. A botnet (short for robot network) is a network of computers infected by malware that are under the control of a single attacking...

ICTKB_IMG

Set up multiple monitors on Windows

Getting another monitor can help you stay productive and organized. If you’re the type of person that opens lots of programs at once, cramming all of them in one monitor can quickly clutter up your screen. With two monitors, you can surf the web...

ICTKB_IMG

Dark Web, Deep Web and Surface Web

If we imagine web as an ocean, the surface web is the top of the ocean which appears to spread for miles around, and which can be seen easily or “accessible”; the deep web is the deeper part of the ocean beneath the surface; the dark web is the...

Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.