Skip to content
The CISO Perspective

The CISO Perspective

Menu
  • Home
  • About
  • TCP on YouTube
  • Contact

Category: Security Strategy

Posted onFebruary 20, 2023February 22, 2023Security Concepts

What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained

by AndyLeave a comment on What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained

Virtual Private Networks (VPNs) have been used for years to provide remote connectivity, but they have limitations in terms of scalability and security. A technology…

Read More
Posted onJuly 21, 2021February 21, 2022Security Concepts

Active Reconnaissance: Overview, Methodology and Tools

by Andy HLeave a comment on Active Reconnaissance: Overview, Methodology and Tools

Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,…

Read More
Posted onMay 7, 2021February 21, 2022Security Concepts

How to Use Canary Tokens for Threat Hunting

by Andy HLeave a comment on How to Use Canary Tokens for Threat Hunting

You may not be familiar with web beacons, but chances are you interact with them every day and don’t even know it. Web beacons are…

Read More
Posted onJanuary 7, 2021February 21, 2022General

The Iran Cyber Threat: What You Need To Know

by Andy HLeave a comment on The Iran Cyber Threat: What You Need To Know

On Monday, Jan 6th, DHS warned US organizations about potential cyber-attacks from Iran and Iran-backed APT groups. The CISA alert was the first public acknowledgment…

Read More
Posted onNovember 7, 2020February 21, 2022Security Concepts

5 Steps To Securing Your SD-WAN

by Andy HLeave a comment on 5 Steps To Securing Your SD-WAN

Gartner predicts that by 2023, 93% of organizations will be doing some form of SDWAN for the WAN edge. And the reasons for this disruption…

Read More
Posted onAugust 31, 2020February 22, 2023Endpoint

Accomplishing Zero Trust Security using SDP

by Andy HLeave a comment on Accomplishing Zero Trust Security using SDP

Zero trust Security is an architecture for today’s modern networks. New technologies like the Software Defined Perimeter have finally brought the concept to reality.

Read More
Posted onMay 27, 2020February 22, 2023Security Concepts

Breaking the Kill Chain: A Defensive Approach

by Andy HLeave a comment on Breaking the Kill Chain: A Defensive Approach

    First developed by Lockheed Martin, the Cybersecurity Kill Chain is a model for describing the steps an attacker must complete to carry a…

Read More

Recent Posts

  • ChatGPT for Offensive Security: Five Attacks
  • Understanding Software Bill of Materials (SBOM) and It’s Role in Software Supply Chain
  • What is Secure Service Edge? SSE vs SASE vs VPNs
  • What is Zero Trust Network Access (ZTNA)? The Zero Trust model, Framework and Technologies Explained
  • Becoming A Product Manager for Engineers

Archives

  • February 2023
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020

Categories

  • Careers
  • Endpoint
  • Endpoint Protection
  • Exploits
  • Firewall
  • General
  • News
  • Security Concepts
  • Security Strategy
  • Security Technologies
  • Sizing
  • Uncategorized
RSS Error: WP HTTP Error: A valid URL was not provided.

The CISO Perspective

TCP was created as a free resource for security news, knowledge and training.
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress