Can ÖzkanHow to Generate SBOM for C# DotNetProjectsIn the dynamic realm of DotNet development, where libraries and dependencies are rather complex, the need for transparency and security has…Mar 16Mar 16
Can ÖzkanPenetration Testing — Vulnerability Scanning with NessusNessus is a widely used vulnerability scanning and assessment tool developed by Tenable Network Security. It is designed to help security…Feb 11Feb 11
Can ÖzkanPenetration Testing — Vulnerability Scanning ExplanationVulnerability scanning is a proactive security technique used to identify and assess weaknesses, security flaws, misconfigurations, design…Feb 11Feb 11
Can ÖzkanPenetration Testing — Scanning with NmapIn the dynamic landscape of cybersecurity, understanding the complexity of network scanning is paramount for both defenders and ethical…Feb 10Feb 10
Can ÖzkanPenetration Testing — Reconnaissance, Information GatheringReconnaissance, also known as the information-gathering phase, is a foundational phase of penetration testing. This crucial stage involves…Feb 5Feb 5
Can ÖzkanDNS in a NutshellDNS, or Domain Name System, is a hierarchical and decentralized naming system used to translate human-readable domain names into numerical…Feb 5Feb 5
Can ÖzkanHow to Generate SBOM PHP ProjectsIn the dynamic realm of PHP development, where libraries and dependencies are rather complex, the need for transparency and security has…Jan 101Jan 101
Can ÖzkanHow to Generate SBOM for Java Maven ProjectsIn the dynamic realm of Java development, where libraries and dependencies are rather complex, the need for transparency and security has…Jan 10Jan 10
Can ÖzkanHow to Generate SBOM for Python ProjectsIn the dynamic realm of Python development, where libraries and dependencies are rather complex, the need for transparency and security has…Nov 28, 2023Nov 28, 2023