What does a CISO need to know Key Compliances and Responsibilities

What does a CISO need to know? Key Compliances and Responsibilities

What it takes to be a professional CISO goes beyond being aware of CISO roles and responsibilities. Although being adept at IT operations is still obligatory to get this job title, a futuristic information security officer has to know how to set a comprehensive business strategy.  What should a CISO focus on? The answer is …

What does a CISO need to know? Key Compliances and Responsibilities Read More »

Kaveh Ghiassi New Head of Marketing

Nordic Defender to Capitalize on New Head of Marketing, Mr. Kaveh Ghiassi, to Reach New Heights

As the top Nordic modern cybersecurity solution provider, Nordic Defender is proud to announce that Kaveh Ghiassi has joined this vibrant company as the head of marketing. With this incredible talent aboard, Nordic Defender is sure to set foot in new realms and reach new peaks in their marketing efforts.  Having experienced rapid growth, Nordic …

Nordic Defender to Capitalize on New Head of Marketing, Mr. Kaveh Ghiassi, to Reach New Heights Read More »

Mahsima Jalooli new Nordic Defender COO

Nordic Defender to Achieve Operational Excellence with Mahsima Jalooli Appointed as the New COO

Nordic Defender, the first and only modern cybersecurity solution provider in the Nordics, is proud to announce the promotion of the highly talented Ms. Mahsima Jalooli from technical account manager and crowd manager to Chief Operating Officer.  In her previous position, Ms.Jalooli has performed exceptionally well, especially with regard to her responsibilities of managing the …

Nordic Defender to Achieve Operational Excellence with Mahsima Jalooli Appointed as the New COO Read More »

The Next Generation Penetration Test An Alternative to Traditional Penetration Testing

The Next Generation Penetration Test: An Alternative to Traditional Penetration Testing

The concept of penetration testing was born in the 1990s as a process of adversary simulation. Its job was to define what a malicious attacker is likely to do, and what they can actually do in a given system. Throughout the decades, high profile security incidents have made security a tangible topic for all. After …

The Next Generation Penetration Test: An Alternative to Traditional Penetration Testing Read More »

Nordic Defender Capture the Flag Competition Chapter Three: Loki

Swedish CTF participants arrive in Loki’s territory on 19 July 2021. The trickster Loki has changed the rules of the game, so not everyone can achieve his great treasury. Based on Loki’s “static point” rule, only the first hunter who solves each challenge gets the full points. The score of the solved challenges decreases gradually …

Nordic Defender Capture the Flag Competition Chapter Three: Loki Read More »

Nordic Defender Capture the Flag Competition Chapter Two: Odin

Odin’s territory remained unconquered after one day The second round of the Nordic’s greatest Capture the Flag challenge started at 4 PM (CET) on the 20th of April. The competition named “Odin” consists of 6 easy, 8 medium, 6 hard challenges. By solving these 20 challenges, participants can collect a total of 2350 points. 1200 …

Nordic Defender Capture the Flag Competition Chapter Two: Odin Read More »

Nordic defender Capture the Flag Chapter One: Tyr

Groundbreaking Records! Congratulations on the unprecedented record you set in our Challenge. We would like to thank all the teams and individuals for participating in the Nordic Defender Challenge Program and for the feedback they gave to help us improve the program. The challenge boasts the participation of 823 teams, 670 individuals from 128 countries …

Nordic defender Capture the Flag Chapter One: Tyr Read More »

Type of Computer forensics investigation

Goal and Purpose of Computer Forensics

“Computer forensics is one of the three main functions of computer security: the TRIAD consists of vulnerability assessment and risk management, network intrusion detection, and incident response computer investigations.” What is computer forensics? A computer forensic is a methodical series of techniques and procedures for gathering evidence from computing equipment and various storage devices and …

Goal and Purpose of Computer Forensics Read More »