Yaksas Security
Subscribe
Sign in
Home
Red Team Training
Cyber Safety Initiatives
GitHub
Archive
About
Latest
Top
Mona.py for exploit devs: 6 must know commands
Six mona.py commands I regularly use during exploit development. They help me speed up the entire process. Watch the video for demonstration.
Oct 19, 2024
•
Yaksas Security
Seven Common Cryptography Attacks
Discover the seven most common cryptography attacks, including brute force, ciphertext-only, and differential cryptanalysis, and how they impact…
Oct 18, 2024
•
Yaksas Security
Security Considerations in Multi-Cloud Architecture
A multi-cloud strategy involves utilizing services from multiple cloud providers, such as AWS, Google Cloud, and Microsoft Azure, to leverage the best…
Oct 13, 2024
•
Yaksas Security
Components of Cloud Security Architecture
A cloud security architecture encompasses a comprehensive framework of tools, technologies, and processes designed to safeguard cloud environments from…
Oct 12, 2024
•
Yaksas Security
The Shared Responsibility Model and Its Challenges
The shared responsibility model is a fundamental framework that delineates the security obligations of cloud service providers (CSPs) and their…
Oct 11, 2024
•
Yaksas Security
Key Cloud Security Challenges
Organizations face numerous obstacles when implementing cloud security controls, which can hinder the effectiveness of their cloud strategies.
Oct 10, 2024
•
Yaksas Security
The Data Breach That Changed Everything
The 2013 Target data breach redefined cybersecurity forever, making it a board-level concern, leading to CISO hirings, and accelerating chip-and-PIN…
Oct 9, 2024
•
Yaksas Security
5 Cloud Security Certifications Worth Pursuing
These vendor agnostic cloud security certifications offer a versatile and comprehensive approach to cloud security, enabling professionals to apply…
Oct 8, 2024
•
Yaksas Security
What is the Cloud Control Matrix (CCM)?
The Cloud Control Matrix (CCM) is a cybersecurity control framework for cloud computing, developed by the Cloud Security Alliance (CSA).
Oct 7, 2024
•
Yaksas Security
5 Cloud Security Best Practices
In this article we outline the top 5 cloud security best practices that you should implement, if you are leveraging cloud services for your…
Oct 6, 2024
•
Yaksas Security
Where Should a CISO Report in an Organization?
Where a CISO reports affects cybersecurity success. Explore various reporting structures, their pros, cons, and the key to a successful cybersecurity…
Oct 5, 2024
•
Yaksas Security
Top Cloud Security Risks
In this article we outline the most critical security risks affecting cloud-based applications.
Oct 4, 2024
•
Yaksas Security
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts