Thursday, June 17, 2021
Home Tags Auditing

Tag: Auditing

Must Need

IT and Tech Challenges

The Top IT and Tech Challenges for Businesses in 2019

Companies, whether small, large, or enterprise-level organizations face their fair share of challenges at any given time. Currently, many of the most...
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature enough to ward off...
Velociraptor : Endpoint Visibility and Collection Tool

Velociraptor : Endpoint Visibility and Collection Tool

Velociraptor is a tool for collecting host based state information using Velocidex Query Language (VQL) queries. To learn more about Velociraptor, read...
Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.
SecretScanner : Find Secrets & Passwords In Container Images And File Systems

SecretScanner : Find Secrets & Passwords In Container Images And File...

Deepfence SecretScanner can find any potential secrets in container images or file systems. What are Secrets?
IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor

IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor

IOCExtract is an advanced Indicator of Compromise (IOC) extractor. This library extracts URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules...
SysAnalyzer : Automated Malcode Analysis System

SysAnalyzer : Automated Malcode Analysis System

SysAnalyzer is an application that was designed to give malcode analysts an automated tool to quickly collect, compare, and report on the...