Recently Updated Pages
Pathways through defenses
To defend against attacks, organizations need to have more than just the understanding of t...
Niru: Adopt an attacker mindset
Hi, I'm Niru, and I lead the red team at Google. The red team at Google simulates attackers tha...
Types of threat actors
Anticipating attacks is an important skill you’ll need to be an effective security professional. ...
Approach cybersecurity with an attacker mindset
Cybersecurity is a continuously changing field. It's a fast-paced environment where new threats a...
Protect all entry points
There's a wide range of vulnerabilities and systems that need to be found. Assessing thos...
Penetration testing
An effective security plan relies on regular testing to find an organization's weaknesses. Previo...
Omad: My learning journey into cybersecurity
My name is Omad, I'm a corporate operations engineer at Google. All I do is solve problems. G...
The importance of updates
At some point in time, you may have wondered, “Why do my devices constantly need updating?” For c...
Approaches to vulnerability scanning
Previously, you learned about a vulnerability assessment, which is the internal review process of...
Vulnerability assessments
Our exploration of the vulnerability management process so far has been focused on a couple...
Open source intelligence
Cyber attacks can sometimes be prevented with the right information, which starts with knowing wh...
Vulnerability management
For every asset that needs protecting, there are dozens of vulnerabilities. Finding tho...
Common vulnerabilities and exposures
We've discussed before that security is a team effort. Did you know the group extends wel...
Defense in depth strategy
A layered defense is difficult to penetrate. When one barrier fails, another takes its pl...
The OWASP Top 10
To prepare for future risks, security professionals need to stay informed. Previously, you learne...
The evolution of hash functions
Hash functions are important controls that are part of every company's security strategy. Hashing...
Access controls and authentication systems
Protecting data is a fundamental feature of security controls. When it comes to keeping i...
The rise of SSO and MFA
Most companies help keep their data safely locked up behind authentication systems. Usernames and...
The mechanisms of authorization
Access is as much about authorization as it is about authentication. One of the most impo...
Why we audit user activity
Have you ever wondered if your employer is keeping a record of when you log into company sy...