Skip to content
The CISO Perspective

The CISO Perspective

Menu
  • Home
  • About
  • TCP on YouTube
  • Contact

Category: Security Concepts

Posted onFebruary 21, 2023February 22, 2023Security Concepts

ChatGPT for Offensive Security: Five Attacks

by AndyLeave a comment on ChatGPT for Offensive Security: Five Attacks

ChatGPT is an AI chatbot that uses Natural Language Processing (NLP) combined with the GPT-3 framework to provide human-like responses. NLP allows the model to…

Read More
Posted onFebruary 21, 2023Security Concepts

Understanding Software Bill of Materials (SBOM) and It’s Role in Software Supply Chain

by AndyLeave a comment on Understanding Software Bill of Materials (SBOM) and It’s Role in Software Supply Chain

In May 2021, the US government signed an Executive Order mandating that software suppliers selling to the government must include a Software Bill of Material…

Read More
Posted onFebruary 20, 2023February 22, 2023Security Concepts

What is Secure Service Edge? SSE vs SASE vs VPNs

by AndyLeave a comment on What is Secure Service Edge? SSE vs SASE vs VPNs

At one point, virtual private networks (VPNs) were a valuable tool for remote workers to access private networks and data centers. But with more and…

Read More
Posted onFebruary 20, 2023February 22, 2023Security Concepts

What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained

by AndyLeave a comment on What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained

Virtual Private Networks (VPNs) have been used for years to provide remote connectivity, but they have limitations in terms of scalability and security. A technology…

Read More
Posted onFebruary 5, 2022February 21, 2022Exploits

Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work

by Andy HLeave a comment on Exploits Explained: How Log4j, Buffer Overflows and Other Exploits Work

How Exploits Work In cybersecurity, the term “exploit” is used to represent a piece of code, data or sequence of commands that takes advantage of…

Read More
Posted onJanuary 13, 2022February 21, 2022Security Concepts

Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA

by Andy HLeave a comment on Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA

Hacking 2FA and MFA When MFA is implemented correctly, it can be an extremely powerful and low-cost way to protect against the weakest link in…

Read More
Posted onAugust 18, 2021February 21, 2022Security Concepts

What is Open-Source Intelligence (OSINT)?  

by Andy HLeave a comment on What is Open-Source Intelligence (OSINT)?  

What is OSINT? In “Breaking the Kill Chain: A Defensive Approach,” we took a look at the seven steps an attacker generally goes through in…

Read More
Posted onJuly 21, 2021February 21, 2022Security Concepts

Active Reconnaissance: Overview, Methodology and Tools

by Andy HLeave a comment on Active Reconnaissance: Overview, Methodology and Tools

Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,…

Read More
Posted onMay 7, 2021February 21, 2022Security Concepts

How to Use Canary Tokens for Threat Hunting

by Andy HLeave a comment on How to Use Canary Tokens for Threat Hunting

You may not be familiar with web beacons, but chances are you interact with them every day and don’t even know it. Web beacons are…

Read More
Posted onNovember 7, 2020February 21, 2022Security Concepts

5 Steps To Securing Your SD-WAN

by Andy HLeave a comment on 5 Steps To Securing Your SD-WAN

Gartner predicts that by 2023, 93% of organizations will be doing some form of SDWAN for the WAN edge. And the reasons for this disruption…

Read More

Posts navigation

Page 1 Page 2 Next Page

Recent Posts

  • ChatGPT for Offensive Security: Five Attacks
  • Understanding Software Bill of Materials (SBOM) and It’s Role in Software Supply Chain
  • What is Secure Service Edge? SSE vs SASE vs VPNs
  • What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
  • Becoming A Product Manager for Engineers

Archives

  • February 2023
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020

Categories

  • Careers
  • Endpoint
  • Endpoint Protection
  • Exploits
  • Firewall
  • General
  • News
  • Security Concepts
  • Security Strategy
  • Security Technologies
  • Sizing
  • Uncategorized
RSS Error: WP HTTP Error: A valid URL was not provided.

The CISO Perspective

TCP was created as a free resource for security news, knowledge and training.
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress