Skip to content
Linkedin-in
X-twitter
blog
Home
blog
Filter
ISO 27001 – Pentesting Guide
ISO27001 can seem daunting to understand. Especially around pentesting and vulnerability management. Learn more about what your team should be considering as you engage into ...
Read More
January 29, 2025
API Security Testing Checklist
APIs are the backbone of modern applications, but they’re often left vulnerable. This checklist provides a step-by-step guide to API security testing, covering the most ...
Read More
October 8, 2024
Advanaced Google Dorking
Google Dorking is a powerful method used by cybersecurity experts to locate misconfigured websites, exposed credentials, and sensitive data online. Learn how this technique can ...
Read More
September 26, 2024
Jr Pentester Roadmap
Thinking about pentesting? Here's our simple roadmap to guide you into a career of excitement and ethical hacking ...
Read More
August 28, 2024
Top 10 AI Security Risks
Dive into the top 10 AI security risks identified by OWASP, offering practical solutions to each. From prompt injection to model theft, we cover the ...
Read More
July 9, 2024
How often should we conduct pentests?
The frequency of your pentests depends on the maturity of your security program and can vary based on several factors ...
Read More
June 29, 2024
Filter
Blog
Career
Red
OSINT
Recon
Web Applications
Technology
Artificial Intelligence
Home
Get Started
Company
Blog
NolaSec
Home
Get Started
Company
Blog
NolaSec