Search Results for: security testing Knowledge Center VPN Solution Security Testing April 30, 2020 In April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution... Knowledge Center Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the Security March 2, 2022 Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done... Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level... Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous... Knowledge Center Outlook Web Application (OWA) and Office 365 (O365) Hacking January 17, 2020 LIFARS regularly conducts penetration tests to ensure the effectiveness of the security measures of our clients maintain strong and can... Knowledge Center NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Blog Post Google Violates Children’s Online Privacy Protection Act (COPPA) April 15, 2020 Children’s Online Privacy Protection Act (COPPA) was promulgated in 1998. This law is not only one of the few federal... Blog Post How to Implement Secure SDLC to Enhance Your Product Development in 5 Stages March 15, 2021 Any business, organization, or team working in the software development field has heard of the software development lifecycle (SDLC). This... Blog Post How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,... Blog Post Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier... Blog Post A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features... Blog Post Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology... Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from... Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Knowledge Center Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems...
Knowledge Center VPN Solution Security Testing April 30, 2020 In April, our client requested LIFARS Pen Testing Team to perform an authenticated black-box penetration test of the VPN solution...
Knowledge Center Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the Security March 2, 2022 Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done...
Blog Post Introduction To Black Teaming Exercises January 15, 2021 From startups to enterprises, organizations of all sizes require a structured approach to secure their IT infrastructure. An adequate level...
Blog Post How To Approach A Purple Teaming Exercise? December 3, 2020 As cyberattacks continue to grow in numbers and impact, businesses cannot adopt a static security program with minor updates. Continuous...
Knowledge Center Outlook Web Application (OWA) and Office 365 (O365) Hacking January 17, 2020 LIFARS regularly conducts penetration tests to ensure the effectiveness of the security measures of our clients maintain strong and can...
Knowledge Center NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Blog Post Google Violates Children’s Online Privacy Protection Act (COPPA) April 15, 2020 Children’s Online Privacy Protection Act (COPPA) was promulgated in 1998. This law is not only one of the few federal...
Blog Post How to Implement Secure SDLC to Enhance Your Product Development in 5 Stages March 15, 2021 Any business, organization, or team working in the software development field has heard of the software development lifecycle (SDLC). This...
Blog Post How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,...
Blog Post Common Mistakes That CISOs Do And How To Avoid Them November 17, 2020 News about data breaches continue to come up, and their pace is only getting faster. It is only becoming easier...
Blog Post A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features...
Blog Post Risk assessment according to NIST SP 800-30 March 3, 2021 The SP 800-30 Guide for Conducting a Risk Assessment is a guideline by the National Institute of Standards and Technology...
Blog Post Incident Types and Taxonomies Used in Cybersec Community May 11, 2021 In the face of this complex and multi-faceted landscape of threat actors and IoCs, security experts can benefit greatly from...
Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program...
Knowledge Center Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems...