Articles

  • Oct 10, 2024 | infosecinstitute.com | Irfan Shakeel |Stephan Miller |Drew Robb |Pedro Tavares

    Penetration testing Linux distributions, commonly known as Linux distros, are operating systems with built-in ethical hacking and penetration testing tools. Security researchers, penetration testers, and ethical hackers use Linux distros to perform various security tasks for organizations. Whether you are pursuing a career in cybersecurity or you’re interested in learning more about penetration testing, there is a Linux distribution OS for you.

  • Jun 21, 2024 | securityboulevard.com | Irfan Shakeel |Barry Strauss

    By Barry Strauss,Infosec,Irfan Shakeel The Gartner Security & Risk Management Summit 2024 showcased the transformative power of artificial intelligence (AI) across various industries, with a particular focus on the cybersecurity landscape. As organizations increasingly adopt AI ...

  • May 9, 2024 | cybersecurity.att.com | Irfan Shakeel

    LevelBlue Blog Security Essentials Building a Robust Defense-in-Depth Architecture for Digital Transformation The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Today's businesses are transforming through integrating IT and OT environments, a shift that's enhancing efficiency and unlocking new operational capabilities. Key functionalities like remote access...

  • May 5, 2024 | cybersecurity.att.com | Irfan Shakeel

    The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. Firewall technology has mirrored the complexities in network security, evolving significantly over time. Originally serving as basic traffic regulators based on IP addresses, firewalls advanced to stateful inspection models, offering a more nuanced approach to network security.

  • Apr 8, 2024 | cybersecurity.att.com | Irfan Shakeel

    The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Here are some of the best SCADA protection strategies to ensure your organization's safety. Late last year, Pennsylvania's Municipal Water Authority of Aliquippa (MWAA) fell victim to a sophisticated cyberattack, targeting its SCADA system at a key booster station.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →