Z. Oualid

115 Results / Page 13 of 13

breach of data

today

close

Cyber attack + blog Z. Oualid

Breach of Data | the companies nightmare

With the rapid advancement in technology, businesses of all sizes have become increasingly reliant on workforce mobility, cloud computing, the Internet of Things (IoT), and digital media. Data breach have gained widespread popularity as sensitive business data is stored on local machines, cloud servers, and enterprise databases. So what is ...

SQL injection attack

today

close

How to + blog Z. Oualid

SQL INJECTION ATTACK PREVENTION IN PHP | CODE EXAMPLES

After several years of penetration testing and working with development teams to secure their systems, I have noticed that there was no complete blog post that gives a detailed explanation of how to prevent SQL injection attacks in all the most popular web application development languages and frameworks. Therefore, I ...

GDPR meaning

today

close

Laws + blog + Cybersecurity Z. Oualid

GDPR meaning and compliance steps

If you have a website or you are thinking about starting one, then you have definitely heard about the GDPR and you also heard that you will need to comply with it. So what is the meaning of GDPR? GDPR “The General Data Protection Regulation” is a European regulation for ...

What is a Ddos attack ?

today

close

Cyber attack + blog Z. Oualid

What is a Ddos attack ?

if you work in the cybersecurity field or at least you have a website that you manage, then you have definitely heard about some DDOS attacks, so what is a DDOS attack? A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic on a server or ...

biometric data could be used in a two factor authentication system.

today

close

Cybersecurity + Defense + blog Z. Oualid

Two factor authentication meaning

Due to the increase of the cyberattack around the glob, many companies have started to implement what we call the Two factor authentication or multifactor authentication system. Two factor authentication (2FA) system, is a subtype of a more general system called Multifactor authentication. Multifactor authentication is the process of using ...

the power of red team

today

  • 1
close

Cybersecurity + blog Z. Oualid

RED TEAM in Cybersecurity

Before we start talking about this concept I’d like to talk a little bit about the history of the word red team. According to Micah Zenko book “Red Team How to Succeed by Thinking Like The Enemy”, within the Roman Catholic Church, the formal title was the Promotor Fidei or ...