Yaksas Security
Subscribe
Sign in
Home
Red Team Training
Cyber Safety Initiatives
GitHub
Archive
About
Where Should a CISO Report in an Organization?
Where a CISO reports affects cybersecurity success. Explore various reporting structures, their pros, cons, and the key to a successful cybersecurity…
Oct 5, 2024
•
Yaksas Security
How CISOs and Corporate Audit Teams Can Drive Cybersecurity Success
A CISO partnering with the audit team can drive executive support for cybersecurity programs, secure funding, and strengthen organisational risk…
Oct 2, 2024
•
Yaksas Security
CERT-In: The first responders of the Indian cyberspace
This post is part of our series Cybersecurity Chronicles from India. This one is all about the The Indian Computer Emergency Response Team (CERT-In).
Oct 1, 2024
•
Yaksas Security
6 Ways to Cover Your Device's Camera
Have you ever wondered that somebody might be watching you though your device's camera? Stay safe with these 6 device camera cover hacks.
Sep 30, 2024
•
Yaksas Security
Why Changing Your Password Every 90 Days May Soon Be Outdated
Are organisations shifting from frequent password changes to longer passwords? Learn about modern trends in password management and how leading…
Sep 29, 2024
•
Yaksas Security
Most Popular
View all
Red Team Adversary Emulation Course
Sep 20, 2024
•
Yaksas Security
Immunity Debugger for Exploit Devs
Sep 22, 2024
•
Yaksas Security
Red Team Operations Attack Lifecycle
Sep 29, 2024
•
Yaksas Security
PoshC2: A Red Teamer's Notes
Sep 29, 2024
•
Yaksas Security
Cybersecurity Leadership
See all
Where Should a CISO Report in an Organization?
Where a CISO reports affects cybersecurity success. Explore various reporting structures, their pros, cons, and the key to a successful cybersecurity…
Oct 5, 2024
•
Yaksas Security
How CISOs and Corporate Audit Teams Can Drive Cybersecurity Success
A CISO partnering with the audit team can drive executive support for cybersecurity programs, secure funding, and strengthen organisational risk…
Oct 2, 2024
•
Yaksas Security
From Risk Owners to Risk Advisors
CISOs should guide cybersecurity risk management, not own risks. Learn why the CISO's advisory role is crucial for business security and executive…
Sep 25, 2024
•
Yaksas Security
Recent posts
See all
PoshC2: A Red Teamer's Notes
A quick reference guide for using PoshC2, a post-exploitation framework, during penetration testing and red teaming engagements.
Sep 29, 2024
•
Yaksas Security
The Three Command and Control Tiers
This post covers the three command and control tiers commonly used during red team and adversary emulation engagements.
Sep 29, 2024
•
Yaksas Security
Introduction to MITRE ATT&CK Framework
This post covers basics of MITRE ATT&CK framework. One of the use cases of ATT&CK is Adversary Emulation exercises.
Sep 29, 2024
•
Yaksas Security
Yaksas Security
Cybersecurity Research
Subscribe
Yaksas Security
Subscribe
About
Archive
Sitemap
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts