Quantcast
Channel: CTF365 Blog
Browsing latest articles
Browse All 28 View Live

Image may be NSFW.
Clik here to view.

CTF365 – Open For Business

This article is for security professionals and system administrators who work for SMEs (Small and Medium Enterprises) and corporations. It’s also for security department/team leaders, system...

View Article


Image may be NSFW.
Clik here to view.

CTF365: Why It Rocks – Two Years Startup Journey

The concept that drives CTF365 was inspired by the Internet, guided by capture the flag (CTF) competitions, and specially crafted for the ITC industry. CTF365 provides a platform where users and teams...

View Article

Image may be NSFW.
Clik here to view.

Interactive Cyber Attack Map

Over the last 6 months, we’ve seen several large companies develop and launch their own “cyber attack map.” So we decided to curate a list of the most popular maps for your convenience. If you’re aware...

View Article

Image may be NSFW.
Clik here to view.

Starting Point Guide for Security Professional Wannabes

In 2014, several financial institutions and other large corporations — including Sony, Target, J.P. Morgan, Ebay and Home Depot — were hacked. These incidents prove that security breeches are not...

View Article

Image may be NSFW.
Clik here to view.

Designing Security Training Labs – Next Generation

Information security training labs are a very important component when it comes to teaching information security or showcasing awesome security software, training your customers to use said software...

View Article


Image may be NSFW.
Clik here to view.

Security Training Labs On Demand

This article is intended for information security trainers and training service managers that work in the Information Security Industry. In a recent article I explained the necessity for and...

View Article

Image may be NSFW.
Clik here to view.

CTF365 Sponsors Infosec Workshops

If you’re an information security professional that perform workshops at InfoSec conferences, this article is worth reading. Everybody likes InfoSec Conferences. They are the best and biggest...

View Article

Image may be NSFW.
Clik here to view.

InfoGraphic – Your PenTest Tools Arsenal

In 2014 we started “Your PenTest Tools Arsenal – Survey”. Its purpose was to have a better picture over the tools that security professionals uses in their day by day activities, to help others choose...

View Article


Image may be NSFW.
Clik here to view.

Your PenTest Tools Arsenal v.2015 – Survey

In 2014 we had our very first “Your PenTest Tools Arsenal” survey. We’ve placed the results in an infographic that can be seen HERE. Now we’re running “Your Pentest Tools Arsenal – v.2.0″ – 2015 Survey...

View Article


Image may be NSFW.
Clik here to view.

Exploit Development, Assembly and R.E [ Short Intro]

Reverse Engineering or called (RE) the process of discovering the technological principles of a mechanical application through analysis of its structure, function and operation. With reverse...

View Article
Browsing latest articles
Browse All 28 View Live