Security Testing
Security Testing Tools and Techniques
Discovery
What is Discovery and how to move from asset management to dynamic AI driven discovery
CTEM (Continuous Threat Exposure Management)
Learn how continuous threat exposure management (CTEM) transforms cybersecurity by providing real-time risk visibility, proactive defense, and smarter remediation.
Open Source Cyber Intelligence (OSINT)
How to Apply Effective OSINT
Fraud
Fraud Vulnerabilities
Basic Cybersecurity Best Practice
The Basics
Accounts / Passwords / Login
Account Take Over, Login-paths and Access
Bot Mitigation
How to Stop or Mitigate the Bad Bots?
Bot Detection
How we use AI to detect the Bad Bots
Hacking
Understanding the Mindset of the Hackers / hacking tools
Behavioural Detection
AI Based Behavioural Detection for Bots
Ecommerce
How Bots target E-Com sites as a rich target environment.
Fingerprinting
Fingerprints & Footprints Explained
Alerts
Alerting on Suspicious or Anomalous Traffic
AI/ML for Bot Detection
AI/ML for Bot Detection. Do bots use AI to evade detection? How we we fight back using AI for Bot Detection
Bad Bots
Bad Bots, what are they? How to Stop bad bots?
Basic Cybersecurity Definitions
Confused by Cybersecurity Jargon? Head to the Jargon Buster.
Good Bots
Comprehensive Guide to the Good Bots, including our Bot Recommendation Engine
