Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to

LogSentinel SIEM DEMO: How To Use LogSentinel

LogSentinel #SIEM #DEMO Sophisticated dashboards, that can be customised according to user preferences, are also available there. On the threat map, you can see the IP’s locations of the actors who have triggered a #security threat for a certain period. The statistical overview gives valuable insight into the top actions, actors, entities or data sources. What’s more, you can search by user activity and familiarise yourself with a specific actor’s behaviour.

Understanding Broken Authentication and Session Management

This video is all about understanding broken authentication and session management. You'll learn the difference between HTTP and HTTPS, what it means to "authenticate" a user, how sessions work, and much more!#brokenauthentication #sessionmanagement Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

How to Use the Snyk CLI to Fix Vulnerabilities in Your Application: The Big Fix

Brian Vermeer, Developer Advocate at Snyk, demonstrates how you can use the Snyk CLI to fix vulnerabilities in your application. Join us for The Big Fix, an event that brings developers and security practitioners round the world to find and fix vulnerabilities. Let's make the Internet a safer and better place than before!

Port 443: What it is & Why we use it

Port 443 is a port that we use to connect to an HTTPS website But what exactly does it do? And why do we use it? In this video, I'll break down the basics of Port 443 and show you how it works!#port443 Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

Review API Scanning Prescan Results

In this video, you will learn how to review Dynamic Analysis prescan scan results for an API specification. After creating and submitting a Dynamic Analysis API specification scan, you can return to the list of Dynamic Analyses at any time to check for status updates and to view results. Please note, you must have the Creator, Reviewer, or Security Lead role to be able to view the results of a Dynamic Analysis, unless the results are linked to a Veracode application profile for which you have permission to view.

What Is Penetration Testing? Benefits And Pen Testing Vulnerabilities

Penetration testing is a way to test the security of your network by simulating an attack on it. This video explains what penetration testing is, why you should use it, and how to find out if your company needs one.#penetrationtesting #pentesting #pentests Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

What is PCI penetration testing? Requirements and Benefits

PCI testing is an important part of running a successful business. But what does it mean? And when should you do it? Watch this video to learn the requirements and benefits of PCI penetration testing, so you can start protecting your company from cyber-attacks!#pcidss #pentesting Cyphere is a UK-based cyber security services provider helping organisations to secure their most prized assets. We provide technical risk assessment (pen testing/ethical hacking) and managed security services. This advice is a true third party opinion, free from any vendor inclinations or reselling objectives.

Pentest 101: How to Dodge the Directory Traversal Vulnerability

Directory Traversal might not be considered as a high-impact vulnerability but it can be a stepping stone to information leak and shell upload vulnerability. The lack of directory traversal security can allow an attacker to manipulate the file path to gain unauthorized access to different files in the directory. You need penetration testing to detect the directory traversal vulnerability. This video is a short explanation of how the file traversal vulnerability can be exploited, and how you can avoid it.