Open in app

Sign In

Write

Sign In

Fahri Korkmaz
Fahri Korkmaz

232 Followers

Home

Lists

About

Published in

System Weakness

·Pinned

Analysis and Modeling of U.S. Cyber Security Salaries

It is believed that Cyber Security professionals have one of the highest salaries in the Information Technology industry. But is that true? And what is realistically expected salaries in the Cyber Security domain? What factors affect the salary of Cyber Security professionals? …

Cybersecurity

9 min read

Analysis and Modeling of U.S. Cyber Security Salaries
Analysis and Modeling of U.S. Cyber Security Salaries
Cybersecurity

9 min read


Aug 31

What is the Cyber Kill Chain?

The cyber kill chain is a model that describes the attack process on IT systems and identifies the stages that an attacker goes through to carry out a successful attack. It consists of the following phases: Reconnaissance: gathering information about the target to develop an attack plan. Weaponization: The creation of malware or other attack tools. Delivery: transferring the malware to the target, e.g. via email attachments or social engineering.

Cybersecurity

1 min read

Cybersecurity

1 min read


Aug 1

How to defend against Cyber Attacks?

An organization can prevent cyber attacks by implementing a comprehensive IT security strategy. This includes: security awareness training: training employees on threats, safe behavior, and responses to possible attacks. Regular reviews: Conduct regular reviews and tests to identify and address vulnerabilities. Firewalls and antivirus software: using firewalls and antivirus software to defend against threats.

Cybersecurity

1 min read

Cybersecurity

1 min read


Jul 15

What is Ransomware?

Ransomware is a type of malware that blocks access to a computer or its data by encrypting it. The hackers then demand a ransom to restore access. Usually, cryptocurrencies are accepted for ransom, e.g. Bitcoin or Monero. Ransomware has significant impacts on businesses, organizations, and individuals. Such as financial losses, the loss of sensitive data, and the disruption of business operations.

Cybersecurity

1 min read

Cybersecurity

1 min read


Jul 1

What is Cloud Security?

First of all, what is the cloud anyway? The cloud is a model for delivering and accessing IT resources and applications over the Internet. Instead of being delivered locally on a single computer or local network, data and applications are delivered to a centralized environment called the cloud. Users can…

Cybersecurity

2 min read

Cybersecurity

2 min read


Jun 15

Should a Penetration Tester know how to code?

It is helpful, but not essential, for a penetration tester to know how to program. It depends on the type of test and the tester’s individual skills. Competence in automating processes: A penetration tester who can program can write scripts and tools to speed up and simplify testing. Understanding of…

Cybersecurity

1 min read

Cybersecurity

1 min read


Jun 1

What does a SOC Lead do?

A security operations center consists of many analysts. In order for a department with so many employees to function, this department must also be managed. This is the job of the SOC Lead. Responsibilities The SOC LEAD makes sure that the SOC is doing its job. I.e. he has to make…

Cybersecurity

1 min read

Cybersecurity

1 min read


May 15

What is MITRE ATT&CK?

The MITRE ATT&CK Framework, short for Adversarial Tactics, Techniques, and Common Knowledge, is a comprehensive collection of attack techniques used by threat actors. It serves as a reference for IT security professionals and as a tool for evaluating the defensive capabilities of systems against specific threats. The framework includes several…

Cybersecurity

1 min read

Cybersecurity

1 min read


May 1

What does a Red Teamer do?

Would you like to hack legally? Then become a Red Teamer. Responsibilities As a Red Teamer, you will be part of a team of hackers. After being assigned by a client, you and your team will try to hack this company as realistically as possible. …

Cybersecurity

1 min read

Cybersecurity

1 min read


Apr 15

What is the IT-Grundschutz?

IT-Grundschutz is a framework developed by the German Federal Office for Information Security to help companies and organizations improve their IT security. It is a catalog of recommended procedures and practices that should be followed to protect IT systems and data from threats and attacks. Basic IT protection is used to: To create uniform security standards: IT-Grundschutz provides a uniform and recognized method for assessing and improving IT security.

Cybersecurity

1 min read

Cybersecurity

1 min read

Fahri Korkmaz

Fahri Korkmaz

232 Followers

Red Teaming | Penetration Testing

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams