Yaksas Security
Subscribe
Sign in
Home
Courses
Cyber Safety Initiatives
AKSH Bot
GitHub
Archive
About
Latest
Top
Mona.py for exploit devs: 6 must know commands
Six mona.py commands I regularly use during exploit development. They help me speed up the entire process. Watch the video for demonstration.
Oct 19
•
Yaksas Security
Share this post
Yaksas Security
Mona.py for exploit devs: 6 must know commands
Copy link
Facebook
Email
Notes
More
Seven Common Cryptography Attacks
Discover the seven most common cryptography attacks, including brute force, ciphertext-only, and differential cryptanalysis, and how they impact…
Oct 18
•
Yaksas Security
Share this post
Yaksas Security
Seven Common Cryptography Attacks
Copy link
Facebook
Email
Notes
More
Security Considerations in Multi-Cloud Architecture
A multi-cloud strategy involves utilizing services from multiple cloud providers, such as AWS, Google Cloud, and Microsoft Azure, to leverage the best…
Oct 13
•
Yaksas Security
Share this post
Yaksas Security
Security Considerations in Multi-Cloud Architecture
Copy link
Facebook
Email
Notes
More
Components of Cloud Security Architecture
A cloud security architecture encompasses a comprehensive framework of tools, technologies, and processes designed to safeguard cloud environments from…
Oct 12
•
Yaksas Security
Share this post
Yaksas Security
Components of Cloud Security Architecture
Copy link
Facebook
Email
Notes
More
The Shared Responsibility Model and Its Challenges
The shared responsibility model is a fundamental framework that delineates the security obligations of cloud service providers (CSPs) and their…
Oct 11
•
Yaksas Security
Share this post
Yaksas Security
The Shared Responsibility Model and Its Challenges
Copy link
Facebook
Email
Notes
More
Key Cloud Security Challenges
Organizations face numerous obstacles when implementing cloud security controls, which can hinder the effectiveness of their cloud strategies.
Oct 10
•
Yaksas Security
Share this post
Yaksas Security
Key Cloud Security Challenges
Copy link
Facebook
Email
Notes
More
The Data Breach That Changed Everything
The 2013 Target data breach redefined cybersecurity forever, making it a board-level concern, leading to CISO hirings, and accelerating chip-and-PIN…
Oct 9
•
Yaksas Security
Share this post
Yaksas Security
The Data Breach That Changed Everything
Copy link
Facebook
Email
Notes
More
5 Cloud Security Certifications Worth Pursuing
These vendor agnostic cloud security certifications offer a versatile and comprehensive approach to cloud security, enabling professionals to apply…
Oct 8
•
Yaksas Security
Share this post
Yaksas Security
5 Cloud Security Certifications Worth Pursuing
Copy link
Facebook
Email
Notes
More
What is the Cloud Control Matrix (CCM)?
The Cloud Control Matrix (CCM) is a cybersecurity control framework for cloud computing, developed by the Cloud Security Alliance (CSA).
Oct 7
•
Yaksas Security
Share this post
Yaksas Security
What is the Cloud Control Matrix (CCM)?
Copy link
Facebook
Email
Notes
More
5 Cloud Security Best Practices
In this article we outline the top 5 cloud security best practices that you should implement, if you are leveraging cloud services for your…
Oct 6
•
Yaksas Security
Share this post
Yaksas Security
5 Cloud Security Best Practices
Copy link
Facebook
Email
Notes
More
Where Should a CISO Report in an Organization?
Where a CISO reports affects cybersecurity success. Explore various reporting structures, their pros, cons, and the key to a successful cybersecurity…
Oct 5
•
Yaksas Security
Share this post
Yaksas Security
Where Should a CISO Report in an Organization?
Copy link
Facebook
Email
Notes
More
Top Cloud Security Risks
In this article we outline the most critical security risks affecting cloud-based applications.
Oct 4
•
Yaksas Security
Share this post
Yaksas Security
Top Cloud Security Risks
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts