IT Security Blog by Jan Kahmen

Blog posts about IT security in general, penetration testing, cloud security and red teaming by Jan Kahmen.

Static Code Analysis: Identifying and Fixing Security Vulnerabilities in an Early Stage
Static Code Analysis: Identifying and Fixing Security Vulnerabilities in an Early Stage
New

Static code analysis can be used to examine source code for many vulnerabilities before it is compiled. How does it work?

More
Effectively Test for Brute Force Attacks: Reasons, Methods and Tools for more Security on the Internet
Effectively Test for Brute Force Attacks: Reasons, Methods and Tools for more Security on the Internet

The principle of brute force attacks: An attacker gains access to a system by systematically trying passwords.

More
Important Tools for Web Application Security Analysis
Important Tools for Web Application Security Analysis

Important tools for web application security analysisaTo counter the dangers of cybercrime, web application security analysis is indispensable. Here you will get to know the tools for this.

More
Secure Web Applications with the OWASP Framework
Secure Web Applications with the OWASP Framework

The OWASP (Open Web Application Security Project) is an NGO that aims to improve the security of web applications.

More
Data protection in the Cloud - How do Providers Implement the GDPR?
Data protection in the Cloud - How do Providers Implement the GDPR?

Here you can find out how secure your own data really is in cloud applications and how data protection is implemented in the cloud.

More
Understanding & Preventing Social Engineering: Five Books to Protect Corporate Data
Understanding & Preventing Social Engineering: Five Books to Protect Corporate Data

How third parties gain unauthorized access to systems by targeting employees to manipulate them into revealing information.

More
Penetration Test: Putting IT Security to the Test
Penetration Test: Putting IT Security to the Test

Penetration tests can be technical, but also organisational in nature. Therefore, checking the digital and physical infrastructure is important.

More