Blog

13 04, 2018

New Release – Mobile Application Security Verification Standard (MASVS) v1.0

By |2018-04-13T15:58:18+02:00April 13th, 2018|Categories: guides|Comments Off on New Release – Mobile Application Security Verification Standard (MASVS) v1.0

The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications. Through the project, their goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.The project recently published the OWASP [...]

30 01, 2018

Blue Team Training Toolkit v2.6 is available for download!

By |2018-01-30T15:47:49+02:00January 30th, 2018|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.6 is available for download!

Blue Team Training Toolkit (BT3) is designed for network analysis training sessions, incident response drills and red team engagements. Based on adversary replication techniques, and with reusability in mind, Blue Team Training Toolkit allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. New Release [...]

9 01, 2018

Top 10 Considerations for Incident Response

By |2018-01-09T12:59:35+02:00January 9th, 2018|Categories: guides|Comments Off on Top 10 Considerations for Incident Response

Breaches happen every day. Is your business prepared? This blog post is based on OWASP Top 10 Guidance for Incident Response, and it will provide a proactive approach to incident response planning.A security incident is an identified occurrence or weakness indicating a possible breach of security policies or failure of safeguards, or a previously unknown [...]

18 12, 2017

5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

By |2017-12-18T13:11:37+02:00December 18th, 2017|Categories: guides|Comments Off on 5 Reasons Why Hackers Are Shifting Their Focus Towards Small Businesses

Because the media mostly focus on bigger data breaches, small business owners may assume that hackers only pursue companies with huge amounts of data, and that their own company would be of little interest to hackers. In reality, this is simply not true. Small Businesses - An Interesting TargetSmall businesses store valuable data [...]

6 12, 2017

OWASP Top 10 2017 Released

By |2021-05-21T13:20:55+02:00December 6th, 2017|Categories: guides|Comments Off on OWASP Top 10 2017 Released

The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications.A primary aim of the OWASP Top 10 is to educate developers, designers, architects, managers, and organizations about the consequences of the most common and most important web [...]

23 11, 2017

Encripto’s 7th Anniversary

By |2019-07-17T10:13:29+02:00November 23rd, 2017|Categories: news|Comments Off on Encripto’s 7th Anniversary

On the 25th of November 2010, Encripto embarked on an exciting journey. At a time when few companies had heard about security testing, and even fewer knew about network security monitoring, founders Juan J. Güelfo and Ingrid C. Bentzen decided to provide IT security services with superior quality. Quality Rather than [...]

15 10, 2017

Security Concerns Regarding EV Charging with “Ladebrikke”

By |2017-10-15T21:56:30+02:00October 15th, 2017|Categories: news|Comments Off on Security Concerns Regarding EV Charging with “Ladebrikke”

When you buy an Electric Vehicle (EV) in Norway, you usually get an EV-owner welcome kit. This includes information about your "rights and duties" as a proud EV owner, and you also get an RFID tag to use at Norwegian public charging stations. These RFID tags are commonly known as "ladebrikke" in Norway, [...]

5 10, 2017

Best Practices – TLS / Transport Layer Protection

By |2017-10-05T17:51:58+02:00October 5th, 2017|Categories: guides|Comments Off on Best Practices – TLS / Transport Layer Protection

This blog post is based on OWASP Transport Layer Protection Cheat Sheet, and it will provide simple rules to follow when implementing transport layer protection for an application.Although the concept of TLS is known to many, the actual details and security specific decisions of implementation are often poorly understood and frequently result in insecure [...]

18 09, 2017

Blue Team Training Toolkit v2.5 has been released

By |2017-09-18T15:17:57+02:00September 18th, 2017|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.5 has been released

Blue Team Training Toolkit (BT3) is designed for network analysis training sessions, incident response drills and red team engagements. Based on adversary replication techniques, and with reusability in mind, Blue Team Training Toolkit allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance Release [...]

4 09, 2017

New Release – Blue Team Training Toolkit v2.4

By |2018-05-16T15:05:54+02:00September 4th, 2017|Categories: Blue Team Training Toolkit (BT3)|Comments Off on New Release – Blue Team Training Toolkit v2.4

Blue Team Training Toolkit (BT3) is designed for network analysis training sessions, incident response drills and red team engagements. Based on adversary replication techniques, and with reusability in mind, Blue Team Training Toolkit allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. BT3 v2.4 [...]

Go to Top