Checkmate
  • Checkmate Home
  • NII Home
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Company

How to Evaluate the ROI on Your Cyber Security Investments?

January 29, 2021 Anuraag B 0

Global Cyber Security Spends The world seems to have undergone a decade’s worth of cybersecurity acceleration within a brief period of one year. And that shows in the cybersecurity spends [more]

SAP Security Assessment Methodology Part 3 – Credential Centric Attack Vectors

January 22, 2021 Syed Sajjad Mehdi 0

Before proceeding with this methodology some SAP terminologies are to be understood: Client – A client is a 3-digit number that could be understood as a specific customer. This means [more]

SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors

December 31, 2020 Syed Sajjad Mehdi 0

You can read Part 1 here.   It may be possible that multiple SAP servers could run across different systems. Identify all the servers before proceeding with the assessment. This [more]

SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP

December 11, 2020 Syed Sajjad Mehdi 2

SAP is a software suite that offers standard business solutions; it is used by thousands of customers across the globe to manage their businesses to manage financial, asset, and cost [more]

Active Subdomain Enumeration (Part 2)

October 27, 2020 Rishabh Sharma 0

You can read part-1 (Passive Subdomain Enumeration) here. Active sub-domain enumeration techniques Brute force or Dictionary Attacks Brute force means guessing possible combinations of the target until the expected output [more]

Passive Subdomain Enumeration (Part 1)

September 24, 2020 Rishabh Sharma 4

What is sub-domain Enumeration? Subdomain enumeration is a process of finding subdomains for one or more domains. Why need sub-domain enumeration? Sub-domain enumeration helps to create a scope of security [more]

The New DIFC Data Protection Law of 2020

August 13, 2020 Swapnil Jariwala 0

Introduction to DIFC Law No. 5 of 2020 Dubai International Financial Center (DIFC), Dubai’s financial services free zone, has issued a new Data Protection Law (DIFC Law No. 5 of [more]

Posts navigation

1 2 … 29 »

Search

"What investments make the most sense when it comes to application security?"


Register for our Application Security – State of the Nation report and fill in the survey!

Recent Posts

  • How to Evaluate the ROI on Your Cyber Security Investments?
  • SAP Security Assessment Methodology Part 3 – Credential Centric Attack Vectors
  • SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors
  • SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP
  • Active Subdomain Enumeration (Part 2)

Recent Comments

  • Anuraag B on SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP
  • Ailene Cerrito on Passive Subdomain Enumeration (Part 1)
  • Kevin Woytowicz on Passive Subdomain Enumeration (Part 1)
  • Mohamed Levreault on Passive Subdomain Enumeration (Part 1)
  • Pradip bendre on SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP

Search

Copyright © 2021 | WordPress Theme by MH Themes