SAP S/4HANA Security Audit

Image for SAP S/4HANA Security Audit

The audited company is a significant commodity enterprise in Asia, originating from a cooperative in a Southeast Asian country and has expanded into an international conglomerate with presences in 18…

Escaping Restricted Virtual Environments

Image for Escaping Restricted Virtual Environments

Virtualization technologies like VMware and Hyper-V have become increasingly popular for delivering virtualized servers, apps, and desktops to businesses. These systems help IT administrators to…

The Role of Cyber Operations in a Shooting War

Image for The Role of Cyber Operations in a Shooting War

Everybody in the cyber security field, whether blue team or red team has asked themselves at least once: How a cyber war would play out either between two nation-states with similar capabilities or…

How to Get Started in Cyber Security

Image for How to Get Started in Cyber Security

Are you thinking to start a career in cybersecurity as a Pentest Engineer? The thrill of finding risks and vulnerabilities in different systems sounds exciting to you? We put together some resources…

Women in CyberSecurity

Image for Women in CyberSecurity

Today we are celebrating a beautiful day for all the women everywhere, The International Women’s Day in 2022. We wanted to explore more about being a female and working in Cyber Security, a male…