Blog

Home/Blog/
26 07, 2018

The Most Relevant Commands Supported by BT3

By |2018-07-26T08:59:44+02:00July 26th, 2018|Categories: Blue Team Training Toolkit (BT3)|Comments Off on The Most Relevant Commands Supported by BT3

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.To ensure usability from the first moment, [...]

19 07, 2018

How to Get Started with Blue Team Training Toolkit

By |2018-07-19T10:53:35+02:00July 19th, 2018|Categories: Blue Team Training Toolkit (BT3)|Comments Off on How to Get Started with Blue Team Training Toolkit

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk.This blog post is going to cover [...]

16 07, 2018

Discover the Benefits of Blue Team Training Toolkit

By |2018-07-16T15:58:42+02:00July 16th, 2018|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Discover the Benefits of Blue Team Training Toolkit

Until the past decade, common threats against computer systems could be stopped by anti-virus software and firewalls. Nowadays, these two countermeasures can be easily bypassed by attackers, and they just offer a basic degree of protection. Moreover, IT personnel are required to have specialized skills within network analysis and incident response in order to [...]

16 05, 2018

New Release – Blue Team Training Toolkit v2.7

By |2018-09-04T14:52:12+02:00May 16th, 2018|Categories: Blue Team Training Toolkit (BT3)|Comments Off on New Release – Blue Team Training Toolkit v2.7

Blue Team Training Toolkit (BT3) is software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level. The toolkit allows you to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance ReleaseBlue Team Training Toolkit [...]

13 04, 2018

New Release – Mobile Application Security Verification Standard (MASVS) v1.0

By |2018-04-13T15:58:18+02:00April 13th, 2018|Categories: guides|Comments Off on New Release – Mobile Application Security Verification Standard (MASVS) v1.0

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, their goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.The project recently published the OWASP [...]

9 02, 2018

Open Application – IT Security Consultant / Penetration Tester

By |2018-12-28T15:06:40+02:00February 9th, 2018|Categories: jobs|Comments Off on Open Application – IT Security Consultant / Penetration Tester

Encripto does not currently have open positions, but we are always interested in people who are reliable, thorough, creative, analytic and share our passion for IT security. Do you meet the requirements listed below? About Encripto Encripto AS provides specialized, high quality, information security services. Since 2010, Encripto has been chosen [...]

30 01, 2018

Blue Team Training Toolkit v2.6 is available for download!

By |2018-01-30T15:47:49+02:00January 30th, 2018|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.6 is available for download!

Blue Team Training Toolkit (BT3) is designed for network analysis training sessions, incident response drills and red team engagements. Based on adversary replication techniques, and with reusability in mind, Blue Team Training Toolkit allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. New Release [...]

9 01, 2018

Top 10 Considerations for Incident Response

By |2018-01-09T12:59:35+02:00January 9th, 2018|Categories: guides|Comments Off on Top 10 Considerations for Incident Response

Breaches happen every day. Is your business prepared? This blog post is based on OWASP Top 10 Guidance for Incident Response, and it will provide a proactive approach to incident response planning.A security incident is an identified occurrence or weakness indicating a possible breach of security policies or failure of safeguards, or a previously unknown [...]

18 12, 2017

5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

By |2017-12-18T13:11:37+02:00December 18th, 2017|Categories: guides|Comments Off on 5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

Because the media mostly focus on bigger data breaches, small business owners may assume that hackers only pursue companies with huge amounts of data, and that their own company would be of little interest to hackers. In reality, this is simply not true. Small Businesses - An Interesting TargetSmall businesses store valuable data [...]

6 12, 2017

OWASP Top 10 2017 Released

By |2017-12-06T12:40:53+02:00December 6th, 2017|Categories: guides|Comments Off on OWASP Top 10 2017 Released

The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications.A primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the consequences of the most common and most important web [...]