May 2023

Security Operations Center (Part 2)

We continue with the previous entry to further develop the most relevant points in order to implement a SOC in our company. PROCEDURES Develop incident response procedures: Establish a well-defined incident response plan that outlines the steps to be followed when a security incident occurs. Include processes for incident triage, containment, eradication, and recovery. Image …

Security Operations Center (Part 2) Read More »

Types of security incidents (Part 1)

Security incidents refer to events or occurrences that compromise the confidentiality, integrity, or availability of an organization’s information or information systems. Image by rawpixel.com on Freepik Here are some common types of security incidents: Let’s develop this list a little and go deeper into each point: Image by storyset on Freepik Image by rawpixel.com on …

Types of security incidents (Part 1) Read More »

Developing a security response plan

A security response plan is a document that outlines how an organization will respond to a security incident. The plan typically includes procedures for detecting, investigating, containing, and mitigating the impact of security incidents such as data breaches, cyber attacks, physical security breaches, and other threats. Image by rawpixel.com on Freepik The purpose of a …

Developing a security response plan Read More »

The way to the perfect penetration test – Part 1

Information gathering is a critical phase in any penetration testing engagement. The goal of this phase is to gather as much information as possible about the target organization, including its systems, applications, and network architecture. Here are some commonly used tools for information gathering: Image by storyset on Freepik WHOIS A tool used to gather …

The way to the perfect penetration test – Part 1 Read More »

Your great friend and neighbor the pentesting technician

Penetration testing, also known as “pen testing” or “ethical hacking,” is the practice of simulating a real-world attack on a computer system or network to identify and exploit vulnerabilities before malicious attackers can do so. Image by Freepik MAIN STEPS A security pentest typically involves the following steps: Image by Freepik Penetration testing is an …

Your great friend and neighbor the pentesting technician Read More »

Scroll to Top