Blogg

/Blogg/
9 02, 2018

IT Security Consultant / Penetration Tester / Ethical Hacker

By | 2018-02-09T18:08:56+00:00 februar 9th, 2018|Categories: jobs|Kommentarer er skrudd av for IT Security Consultant / Penetration Tester / Ethical Hacker

Encripto is seeking an IT security consultant to join our team. The ideal candidate will be reliable, thorough, creative, analytic and share our passion for IT security. We offer a flexible and challenging work environment, with great opportunities for personal and career development. Encripto is also open to consider freelance work arrangements. About [...]

29 01, 2018

Blue Team Training Toolkit v2.6 is available for download!

By | 2018-01-30T15:52:44+00:00 januar 29th, 2018|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for Blue Team Training Toolkit v2.6 is available for download!

Blue Team Training Toolkit (BT3) is designed for network analysis training sessions, incident response drills and red team engagements. Based on adversary replication techniques, and with reusability in mind, Blue Team Training Toolkit allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. New Release [...]

9 01, 2018

Top 10 Considerations for Incident Response

By | 2018-01-09T12:59:31+00:00 januar 9th, 2018|Categories: guides|Kommentarer er skrudd av for Top 10 Considerations for Incident Response

Breaches happen every day. Is your business prepared? This blog post is based on OWASP Top 10 Guidance for Incident Response, and it will provide a proactive approach to incident response planning.A security incident is an identified occurrence or weakness indicating a possible breach of security policies or failure of safeguards, or a previously unknown [...]

18 12, 2017

5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

By | 2017-12-18T13:13:35+00:00 desember 18th, 2017|Categories: guides|Kommentarer er skrudd av for 5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

Because the media mostly focus on bigger data breaches, small business owners may assume that hackers only pursue companies with huge amounts of data, and that their own company would be of little interest to hackers. In reality, this is simply not true. Small Businesses - An Interesting TargetSmall businesses store valuable data [...]

6 12, 2017

OWASP Top 10 2017 Released

By | 2017-12-06T12:40:48+00:00 desember 6th, 2017|Categories: guides|Kommentarer er skrudd av for OWASP Top 10 2017 Released

The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications.A primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the consequences of the most common and most important web [...]

23 11, 2017

Encripto’s 7th Anniversary

By | 2017-11-23T16:33:02+00:00 november 23rd, 2017|Categories: news|Kommentarer er skrudd av for Encripto’s 7th Anniversary

On the 25th of November 2010, Encripto embarked on an exciting journey.At a time when few companies had heard about security testing, and even fewer knew about network security monitoring, founders Juan J. Güelfo and Ingrid C. Bentzen decided to provide IT security services with superior quality. Quality Rather than QuantityThrough dedication, hard [...]

15 10, 2017

Security Concerns Regarding EV Charging with «Ladebrikke»

By | 2017-10-15T21:56:14+00:00 oktober 15th, 2017|Categories: news|Kommentarer er skrudd av for Security Concerns Regarding EV Charging with «Ladebrikke»

When you buy an Electric Vehicle (EV) in Norway, you usually get an EV-owner welcome kit. This includes information about your "rights and duties" as a proud EV owner, and you also get an RFID tag to use at Norwegian public charging stations. These RFID tags are commonly known as "ladebrikke" in Norway, [...]

5 10, 2017

Best Practices – TLS / Transport Layer Protection

By | 2017-10-05T17:51:54+00:00 oktober 5th, 2017|Categories: guides|Kommentarer er skrudd av for Best Practices – TLS / Transport Layer Protection

This blog post is based on OWASP Transport Layer Protection Cheat Sheet, and it will provide simple rules to follow when implementing transport layer protection for an application.Although the concept of TLS is known to many, the actual details and security specific decisions of implementation are often poorly understood and frequently result in insecure [...]

18 09, 2017

Blue Team Training Toolkit v2.5 has been released

By | 2017-09-18T15:17:52+00:00 september 18th, 2017|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for Blue Team Training Toolkit v2.5 has been released

Blue Team Training Toolkit (BT3) is designed for network analysis training sessions, incident response drills and red team engagements. Based on adversary replication techniques, and with reusability in mind, Blue Team Training Toolkit allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance Release [...]

4 09, 2017

New release – Blue Team Training Toolkit v2.4

By | 2017-09-04T14:58:03+00:00 september 4th, 2017|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for New release – Blue Team Training Toolkit v2.4

Blue Team Training Toolkit (BT3) is designed for network analysis training sessions, incident response drills and red team engagements. Based on adversary replication techniques, and with reusability in mind, Blue Team Training Toolkit allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. BT3 v2.4 [...]