Blog

24 08, 2017

10 Critical Security Areas That Software Developers Must Be Aware Of

By |2022-05-04T09:54:20+02:00August 24th, 2017|Categories: guides|Comments Off on 10 Critical Security Areas That Software Developers Must Be Aware Of

As software developers author the code that makes up a web application, they need to embrace and practice a wide variety of secure coding techniques.All tiers of a web application, the user interface, the business logic, the controller, the database code and more – all need to be developed with security in mind. [...]

17 07, 2017

New Release – Blue Team Training Toolkit v2.3!

By |2018-05-16T15:06:37+02:00July 17th, 2017|Categories: Blue Team Training Toolkit (BT3), Maligno, Pcapteller, tools|Comments Off on New Release – Blue Team Training Toolkit v2.3!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. BT3 v2.3 - New Features Blue Team Training Toolkit [...]

22 04, 2017

Blue Team Training Toolkit v2.2 has been released!

By |2017-04-22T21:12:17+02:00April 22nd, 2017|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.2 has been released!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. New Release - Better Usability Blue Team Training [...]

20 03, 2017

4 Reasons Why Your Company Should Conduct Network Security Testing

By |2023-05-05T13:02:14+02:00March 20th, 2017|Categories: guides|Comments Off on 4 Reasons Why Your Company Should Conduct Network Security Testing

Cyber attacks are a risk for all businesses, regardless of size. Security testing will reveal if your company's security measures can withstand external threats, and whether they are adequate and functioning correctly.Effective network security testing simulates an attack from a malicious source, mapping the possibility of an attack and what consequences it can have [...]

7 03, 2017

Blue Team Training Toolkit v2.1.1 has been released!

By |2017-03-07T21:53:51+02:00March 7th, 2017|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.1.1 has been released!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Maintenance ReleaseBlue Team Training Toolkit version 2.1.1 includes bug [...]

20 01, 2017

Why Should Software Suppliers Conduct Security Testing?

By |2023-05-05T13:02:45+02:00January 20th, 2017|Categories: guides|Comments Off on Why Should Software Suppliers Conduct Security Testing?

Most software suppliers are highly skilled at what they do. Their developers are experts at building systems, and making things work. Hackers do however have a completely different mindset. Their focus are on how to break things, and on how to exploit functionality in systems. Because of this, software suppliers can benefit from conducting [...]

12 01, 2017

How Much Does a Network Security Test Cost?

By |2023-05-05T13:02:53+02:00January 12th, 2017|Categories: guides|Comments Off on How Much Does a Network Security Test Cost?

Cyber attacks are a risk for all businesses, regardless of size. A security test can reveal if your security measures can withstand external threats, and whether they are adequate and functioning correctly. Effective network security testing simulates an attack from a malicious source. Mapping the possibility of an attack and what consequences it can [...]

22 11, 2016

Blue Team Training Toolkit v2.1 has been released!

By |2017-04-22T21:18:50+02:00November 22nd, 2016|Categories: Blue Team Training Toolkit (BT3)|Comments Off on Blue Team Training Toolkit v2.1 has been released!

Blue Team Training Toolkit (BT3) introduces improvements in current computer network defense analysis training. Based on adversary replication techniques, and with reusability in mind, BT3 allows individuals and organizations to create realistic computer attack scenarios, while reducing infrastructure costs, implementation time and risk. Mocksum - New Module This version includes Mocksum, [...]

17 11, 2016

Encripto Strives to be Environmentally Sustainable

By |2017-01-31T15:18:54+02:00November 17th, 2016|Categories: news|Comments Off on Encripto Strives to be Environmentally Sustainable

At Encripto, we are constantly striving to reduce our environmental footprint. Extensive use of Internet and video conferencing is among our most important measures to reduce emissions of harmful greenhouse gases.In this blog post we want to share some tips and tricks on how we became more environmentally sustainable in our day-to-day operations. Some [...]

16 11, 2016

Encripto Supports Entrepreneurs through Kiva

By |2019-07-17T10:14:25+02:00November 16th, 2016|Categories: news|Comments Off on Encripto Supports Entrepreneurs through Kiva

Some years ago the team at Encripto discovered Kiva, an international nonprofit organization that helps people create a better future for themselves, their families and their communities through microfinance. As Encripto strives to be a responsible business community member, we decided to get actively involved. What is microfinance? According to Investopedia, microfinance is [...]

Go to Top