Cybersecurity

10 Results / Page 1 of 2

Background
CVE check

todayMay 11, 2021

close

Cybersecurity + Defense + blog Z. Oualid

Do all vulnerabilities have CVE?

CVE is a very popular word in the cyber security industry. If you take any penetration test or any vulnerability assessment report, you will find a bunch of CVEs for every asset. However, does this means that all the vulnerabilities have a CVE? According to the vulnDB database of discovered ...

common API vulnerabilities

todayMarch 12, 2021

close

Cybersecurity + blog Z. Oualid

10 most common API security attacks

APIs are the new most popular way to make complex and scalable web applications. According to the community forum programmableweb.com in 2015 they have listed 12,000 APIs in their directory, and in early 2019 they discovered that the number has gone to nearly 22,000, which prove the rapid growth in ...

GDPR meaning

todayJanuary 26, 2021

close

Cybersecurity + Laws + blog Z. Oualid

GDPR meaning and compliance steps

If you have a website or you are thinking about starting one, then you have definitely heard about the GDPR and you also heard that you will need to comply with it. So what is the meaning of GDPR? GDPR “The General Data Protection Regulation” is a European regulation for ...

biometric data could be used in a two factor authentication system.

todayJanuary 20, 2021

close

Cybersecurity + Defense + blog Z. Oualid

Two factor authentication meaning

Due to the increase of the cyberattack around the glob, many companies have started to implement what we call the Two factor authentication or multifactor authentication system. Two factor authentication (2FA) system, is a subtype of a more general system called Multifactor authentication. Multifactor authentication is the process of using ...