Open in app

Sign in

Medium Logo
Write

Sign in

bspeka
bspeka

1 follower

Home

About

The Cost of Ignoring Subdomain Takeover: A Wake-Up Call for Risk Management Officers

Introduction

Aug 15, 2023
The Cost of Ignoring Subdomain Takeover: A Wake-Up Call for Risk Management Officers
The Cost of Ignoring Subdomain Takeover: A Wake-Up Call for Risk Management Officers
Aug 15, 2023

DNS Records: Their Crucial Role in Subdomain Takeover

Introduction

Aug 1, 2023
DNS Records: Their Crucial Role in Subdomain Takeover
DNS Records: Their Crucial Role in Subdomain Takeover
Aug 1, 2023

Demystifying Subdomain Takeover: A Comprehensive Guide to Understanding and Preventing…

Introduction

Jul 18, 2023
Jul 18, 2023

Insider Threat. How to prevent Insider Threat in VCS

Who is an insider?

Nov 2, 2022
Insider Threat. How to prevent Insider Threat in VCS
Insider Threat. How to prevent Insider Threat in VCS
Nov 2, 2022

What is the difference between Penetration Testing and Vulnerability Assessment?

Intro

Jun 17, 2021
What is the difference between Penetration Testing and Vulnerability Assessment?
What is the difference between Penetration Testing and Vulnerability Assessment?
Jun 17, 2021
bspeka

bspeka

1 follower

We're helping organizations identify and address potential security vulnerabilities in applications and infrastructure.

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech