In this book review, I looked at the topic of pentesting cloud-based applications, specifically Microsoft’s Azure. While the focus of the book was for Azure, a lot of the information will be beneficial no matter the cloud environment.
About Ronald McClellan
This author has not written his bio yet.
But we are proud to say that Ronald McClellan contributed 6 entries already.
Entries by Ronald McClellan
Let’s face it here, the term “Blackhat” is related to hacking but it’s clear they didn’t have anybody on the set that knew what that meant
Most of us know about cookie being used to track what websites or searches you have been performing in order to give us web based ads on top or off to the side of your web browsers. This has been going on for a long time and has become a norm for most search engines and others that make their living off of advertising.
Something I see get overlooked often in reviewing products, especially expensive security products, is support. I’ve done hundreds of product reviews over the years and numerous benchmarking comparisons to find the best software/hardware for the job. Early on I took for granted the type of support and the ease of access to qualified technical support staff, now it is my 2nd priority when investigating any product.
Apparently, everyone was waiting for the update, while small in size and a quick download for the iPad, the same could not be said for the iPhone. The patch for the iPhone took over an hour for the 300+ MB file to be downloaded. The latest versions are now 4.0.2 for the iPhone and 3.2.2 for the iPad.
As the popularity of the small Apple products (iPhone, iPad, iTouch) take off, they are drawing the attentions of hackers. Some hackers just want to access the OS so they remove roadblocks for application customization and to add unauthorized tools and programs, while others might want to do damage or steal your information.
Bellow are some interesting links for you! Enjoy your stay :)
- The Open-Source Intelligence (OSINT) CycleSeptember 19, 2022 - 7:25 am
- Non-sensitive PII + Sensitive PII = Sensitive PIIApril 30, 2021 - 8:55 pm
- The Civilian Cybersecurity Reserve: A National Guard-like program to address growing cybersecurity vulnerabilities faced by the U.S. governmentApril 30, 2021 - 8:48 pm
Our support Hotline is available 24 Hours a day: (240) 880-8947
- Monday-Friday: 9am to 5pm
- Saturday: 10am to 2pm
- Sunday: Closed