Your resource center for all things cybersecurity.
Cybersecurity is the continuous protection of data. From penetration testing to cloud security, HorangiPedia helps you understand the evolving sphere of cybersecurity in its distinct domains.
What Is Ransomware?
Ransomware is popularly described as a type of attack where the perpetrators hold the victims’ data and resources hostage until a ransom is paid. Everything that is connected provides a bigger landscape for ransomware threats.
What Is Zero Trust?
Zero Trust is a security framework, or concept that assumes trust is a vulnerability and is thus eliminated. The concept of Zero Trust stems from issues with older practices, where individuals or devices that have been given access to the network are automatically trusted, whereas those outside of the network are not.
What Is Red Teaming?
Red teaming is an intelligence-led assessment that simulates real-life threat actors. Read the article to find out more about red teaming and what it can do.
What Is DevSecOps?
DevSecOps is a framework that organizations use to manage their development process to include software security assessments as a key component in all stages of the development cycle.
What Are Cookies?
Cookies as we know it are usually desserts, but the cookies in this article are better known as Internet cookies, HTTP cookies or web cookies. Such cookies are a means of transporting data without altering them. Today, cookies are widely used for consumer behaviour tracking and advertising purposes.
What Is Vulnerability Assessment?
Vulnerability Assessment (VA), not to be confused with the Vulnerability Management process, is the activity of discovering and identifying vulnerabilities in system components. In this article, we explore the definition of VA, its role in penetration testing, and the vulnerability management framework.
Subscribe to the Horangi Newsletter.
Hear from our Horangi tech experts as we go deep into up-and-coming cyber threats, new solutions, and talk about the future of cybersecurity.