Blogg

17 07, 2017

New release – Blue Team Training Toolkit v2.3!

By |2017-07-17T12:47:35+02:00juli 17th, 2017|Categories: Blue Team Training Toolkit (BT3), Maligno, Pcapteller, tools|Kommentarer er skrudd av for New release – Blue Team Training Toolkit v2.3!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. BT3 v2.3 - New Features Blue Team Training Toolkit [...]

22 04, 2017

Blue Team Training Toolkit v2.2 has been released!

By |2017-04-22T21:15:38+02:00april 22nd, 2017|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for Blue Team Training Toolkit v2.2 has been released!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. New Release - Better Usability Blue Team Training [...]

20 03, 2017

4 Reasons Why Your Company Should Conduct Network Security Testing

By |2023-05-05T13:02:27+02:00mars 20th, 2017|Categories: guides|Kommentarer er skrudd av for 4 Reasons Why Your Company Should Conduct Network Security Testing

Cyber attacks are a risk for all businesses, regardless of size. Security testing will reveal if your company's security measures can withstand external threats, and whether they are adequate and functioning correctly.Effective network security testing simulates an attack from a malicious source, mapping the possibility of an attack and what consequences it can have [...]

7 03, 2017

Blue Team Training Toolkit v2.1.1 has been released!

By |2017-03-07T21:52:48+02:00mars 7th, 2017|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for Blue Team Training Toolkit v2.1.1 has been released!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance Release Blue Team Training Toolkit version 2.1.1 [...]

20 01, 2017

Why Should Software Suppliers Conduct Security Testing?

By |2023-05-05T13:02:36+02:00januar 20th, 2017|Categories: guides|Kommentarer er skrudd av for Why Should Software Suppliers Conduct Security Testing?

Most software suppliers are highly skilled at what they do. Their developers are experts at building systems, and making things work. Hackers do however have a completely different mindset. Their focus are on how to break things, and on how to exploit functionality in systems. Because of this, software suppliers can benefit from conducting [...]

12 01, 2017

How Much Does a Network Security Test Cost?

By |2023-05-05T13:03:02+02:00januar 12th, 2017|Categories: guides|Kommentarer er skrudd av for How Much Does a Network Security Test Cost?

Cyber attacks are a risk for all businesses, regardless of size. A security test can reveal if your security measures can withstand external threats, and whether they are adequate and functioning correctly. Effective network security testing simulates an attack from a malicious source. Mapping the possibility of an attack and what consequences it can [...]

22 11, 2016

Blue Team Training Toolkit v2.1 has been released!

By |2017-04-22T21:20:02+02:00november 22nd, 2016|Categories: Blue Team Training Toolkit (BT3)|Kommentarer er skrudd av for Blue Team Training Toolkit v2.1 has been released!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Mocksum - New Module This version includes Mocksum, [...]

17 11, 2016

Encripto Strives to be Environmentally Sustainable

By |2017-01-31T15:18:30+02:00november 17th, 2016|Categories: news|Kommentarer er skrudd av for Encripto Strives to be Environmentally Sustainable

At Encripto, we are constantly striving to reduce our environmental footprint. Extensive use of Internet and video conferencing is among our most important measures to reduce emissions of harmful greenhouse gases.In this blog post we want to share some tips and tricks on how we became more environmentally sustainable in our day-to-day operations. Some [...]

16 11, 2016

Encripto Supports Entrepreneurs through Kiva

By |2019-07-17T10:14:39+02:00november 16th, 2016|Categories: news|Kommentarer er skrudd av for Encripto Supports Entrepreneurs through Kiva

Some years ago the team at Encripto discovered Kiva, an international nonprofit organization that helps people create a better future for themselves, their families and their communities through microfinance. As Encripto strives to be a responsible business community member, we decided to get actively involved. What is microfinance? According to Investopedia, microfinance [...]

10 10, 2016

How Exploit Kits are Attacking You while Surfing Legit Websites

By |2017-01-31T15:32:54+02:00oktober 10th, 2016|Categories: guides|Kommentarer er skrudd av for How Exploit Kits are Attacking You while Surfing Legit Websites

Exploit kits can download malicious code and malware on your computer automatically while you are surfing the Internet. In this blog post we will have a closer look at this devious form of attack. What are exploit kits?Exploit kits are tools that cyber criminals use to scan your system for vulnerabilities, exploit the [...]

Go to Top