cissp
16.4K subscribers
955 photos
66 videos
1.73K files
4.8K links
@cissp
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood
Download Telegram
Online possession, posting and circulation of child pornography or rape/gang rape content is a punishable offence. Report these contents through National Cybercrime Reporting Portal (https://cybercrime.gov.in) of MHA.
The mission of OWASP Software Assurance Maturity Model (SAMM) is to be the prime maturity model for software assurance that provides an effective and measurable way for all types of organizations to analyze and improve their software security posture. OWASP SAMM supports the complete software lifecycle, including development and acquisition, and is technology and process agnostic. It is intentionally built to be evolutive and risk-driven in nature.

https://owaspsamm.org/model/
Windows on an external hard drive, USB flash drive or Thunderbolt drive, which means you can carry this portable Windows USB or Thunderbolt drive to anywhere and use it on any computer.

https://www.easyuefi.com/wintousb/
ySign is a new blockchain-based global platform for free communication and discreet conversations with 100% privacy, created as an opportunity to stay anonymous and secure.

https://www.ysign.io
Keeping Data Sanitization Policies Square With Enterprise Security


Data Point No. 1: Successful communication of data sanitization policies relies upon both the policy owner’s experience and organizational structure.

Data Point No. 2: Equipment left in storage areas is putting companies at risk of insider threats and data breaches.

Data Point No. 3: Flexible workers are most likely to compromise company data policy.

Data Point No. 4: Senior management is not taking direct responsibility for IT asset erasure.
M0B tool - Auto Detect CMS And Exploit

https://github.com/mobrine-mob/M0B-tool
OSCP PWK 2020 :

94.23.154.4/pwk.zip

have fun guys
Configuration management software is a broad category of tools and services that enable administrators to manage configuration at scale in a policy driven, repeatable and automated approach.

Configuration Management Tools - Key Features:
• Configuration: By definition, configuration management tools all enable users to configure the options needed for deployment and operations.
• Automated deployment: The ability to automatically deploy software and virtual infrastructure, in a policy driven approach with defined configuration is a key attribute.
• Policy compliance: Keeping infrastructure and software inline with policy is a valuable feature for most organizations.

How to Choose a Configuration Management Tool:
• Scope: Identify what type of software or infrastructure that needs to be managed and make sure it's supported by the tool
• Complexity: Some tools are easier than others to manage both in terms of onboarding and ongoing control. Be sure to try out a tool in limited deployment before committing.
• Cost: Is the solution something that scales to cover different use-cases while remaining cost-effective?

Top Configuration Management Solutions:
• Chef
• CFEngine
• Hashicorp Terraform
• Puppet
• Red Hat Ansible
• Saltstack