CNA Tactics: a first proposal
(Editor’s note: this post was originally published in the Spanish version of Security Art Work on 11th November 2019) Today we have a doctrinal and somewhat metaphysical article… I.e., something dense....
View ArticleThe Importance of Server Hardening – Part 1. Introduction and Types of...
(Editor’s note: this post was originally published in the Spanish version of Security Art Work on 1st July 2019) Today we publish the first of three articles courtesy of Jorge García on the importance...
View ArticleThe fight for privacy
The post, next week. Own text. Original comic strip by RaphComic. Modified with permission. La entrada The fight for privacy aparece primero en Security Art Work.
View ArticleThe Importance of Server Hardening – Part 2. Hardening the Server
(Editor’s note: this post was originally published in the Spanish version of Security Art Work on 4th July 2019) Today we publish the second of three articles courtesy of Jorge Garcia on the importance...
View ArticleThe 5 Most Common Smart Contract Vulnerabilities
Today’s post is authored by Stefan Beyer, CEO @ Cryptonics, Blockchain Consultant and Smart Contract Auditor. Please enjoy. Smart contracts are hard to get right. Their three main properties, the...
View ArticleWhat Recent Supply Chain Attacks On IOTA and Monero Can Teach Us About...
Today’s post is authored by Stefan Beyer, CEO @ Cryptonics, Blockchain Consultant and Smart Contract Auditor. If you are interested in learning about blockchain technology, we recommend you to check...
View ArticleGuide to Assessing Your Organization’s Internal Cybersecurity Readiness in 2020
Today’s post is authored by Robert Mardisalu, co-founder & editor of TheBestVPN.com, a computer security professional, privacy specialist and cybersecurity writer. He has written for many...
View ArticleChina: From culture to conflict in the cyberspace
Since in 2013 the US cybersecurity consultancy Mandiant published its famous report about APT1, showing its links with different agencies presumably associated with the Chinese government, the news...
View ArticleBusiness Continuity Plan: before and after COVID-19
The current pandemic situation caused by the infamous COVID-19 (or Coronavirus) is impacting all areas of society: the first and most important, that of public health and the individual’s inherent...
View ArticleEvading web blockages by using a web server on port-forwarder GO
After his last dispute (https://www.securityartwork.es/2018/02/26/evadiendo-av-shellter-tambien-sysmon-wazuh-i/), Pepote decided to rehire Pepito, who at heart was a good worker. But before that,...
View Article