#security
Read more stories on Hashnode
Articles with this tag
OAuth 2 is a widely-used authorization framework that allows clients to access resources on behalf of a user. While it is a powerful tool for enabling...
Unsigned DLLs, or dynamic-link libraries, are executable files that contain code that can be used by multiple programs on a Windows system. While DLLs...
I recently applied for a Cybersecurity Internship and one of the pre-interview tasks was to prepare a Cyber Incident Response Plan for a Ransomware...
Many security professionals like myself have been wondering how to get hands-on experience with sentinel and play around with it given that it's still...
Some of the objectives of a Security Operations Center (SOC) team include monitoring, detecting, analyzing, preventing and responding to security...