The new e-learning programme for PKO Bank Polski
When it comes to security management in a corporate environment, companies tend to invest more in infrastructure rather than training their employees. The human factor is always the weakest link – even the most secured information or account can be hacked due to lack of vigilance, so education is a vital part of security breach […]
Central Ohio ISSA InfoSec Summit Summary
Hacker’s Paradise: Top 10 Biggest Threats When Working From Home During her Keynote at Central Ohio Infosec Summit Paula discussed 10 biggest threats that should be taken under consideration while talking about secure working from home. Moreover, she raised few extremely important questions regarding security… check out some of them below: Do we treat cyber […]
GISEC Global Conference 2021 Summary
We are really excited that Paula had a chance to finally join an onsite event! On June 1st she delivered 2 sessions in Dubai World Trade Centre at GISEC Global Conference 2021 – both being very engaging and well-received by the audience. Do you want to know more about the sessions? Check out the recap […]
What is it Really Like to Work in Cybersecurity?
Cybersecurity isn’t for everyone, but my personal experience of working in this sector has been hugely positive. Because of my job, I am challenged every day and I never stop learning new things.
10 things you should know about Incident Response and Forensics in 2023
2022 in the cybersecurity consulting world has been absolutely intense. Still, there is room for cybersecurity posture improvement. Besides the regular penetration tests that we deliver, we have also dealt with too many incidents happening on the Customers’ side. Even though every story is unique, they all have a couple of things in common. Here […]
Hacks Weekly #54 Crashing Application
The first step is to install the Dumping Service. In the video attached, we’re doing it by running CreateDumpingService.bat. We need to start the service by running sc start dumpingservice. Afterwards, we can see the start pending. We can check sc query dumpingservice. Now it is running. The next step is to open the PerfView. […]
Hacks Weekly #58 The Biggest PKI Misconfigurations
Get ready for another episode of Hacks Weekly, where we dive deep into the world of the biggest PKI misconfigurations. This time, we’ve got a special guest, Mike Jankowski-Lorek, PhD, Cybersecurity Expert and CQURE of Consulting at CQURE, who’s here to take your knowledge to new heights. During this episode, we will go through the most […]
Hacks Weekly #59 Webinars: Active Directory Security Management: From Threat Detection to Effective Response
The cybersecurity landscape constantly changes, and so does CQURE Academy. We always keep an eye on the industry updates and come up with new ways of delivering juicy content for all the knowledge-seekers. This time, we would like to present the premiere of our brand new Hacks Weekly formula that we are adapting now: webinar […]