This document contains a collection of blog posts related to cybersecurity, cloud computing, Docker, and other related topics. Some highlighted posts include creating a personal navigation site using Docker, listing folder/file NTFS permissions for audit check, and creating a free file list app for multiple cloud storages using Docker.
This article discusses the importance of vulnerability scanning and the areas that need to be covered, including operating systems, network infrastructure, web applications, databases, source code, containers and microservices, and third-party and open-source libraries. It also highlights the benefits of using open-source vulnerability scanners and lists the top 20 open-source vulnerability scanners in 2023, categorized by web application scanners, network scanners, Docker and Kubernetes scanners, code scanners, and infrastructure scanners. The article concludes by emphasizing the importance of continuous scanning and monitoring and complementing vulnerability scanning with other security practices.
The terms "cybersecurity" and "information security" are often used interchangeably, but there is a slight difference between them. Cybersecurity focuses on protecting computer systems and networks from online threats, while information security covers a wider scope by protecting data in all forms. Cybersecurity mainly focuses on external threats, while information security considers both internal and external risks. Organizations should adopt comprehensive information security strategies to reduce the risk of breaches and leaks with serious consequences. Integrating cybersecurity and information security is key in today's digital world to ensure protection against cyber threats and defend valuable data.
This post compiles 10 popular PowerShell tips and tricks, including generating PowerShell code with ChatGPT, navigating the Windows file system, importing the Active Directory module, splitting strings, signing PowerShell scripts, encrypting sensitive information, accessing Azure AD, exporting command history, scanning networks for connected devices, and tracking group policy drift.