Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Assessment

  1. Home
  2. Assessment

Category: Assessment

Assessment

SAP Security Assessment Methodology Part 3 – Credential Centric Attack Vectors

Before proceeding with this methodology some SAP terminologies are to be understood: Client – A client is a 3-digit number that could be understood as […]

January 22, 2021January 21, 2025
0
Assessment

SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors

You can read Part 1 here.   It may be possible that multiple SAP servers could run across different systems. Identify all the servers before […]

December 31, 2020January 20, 2025
0
Assessment

SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP

SAP is a software suite that offers standard business solutions; it is used by thousands of customers across the globe to manage their businesses to […]

December 11, 2020January 20, 2025
2
Assessment

Security Assessment of the IBM i (AS 400) System

A few months back, I was asked to perform a security assessment of the core banking setup for a bank. The core banking application was […]

August 9, 2020January 20, 2025
1
webinar-change-in-red-team-assessment-approach-post-covid-19-by-shrikant-antre
Assessment Red Team

[Webinar] Change in Red Team Assessment approach post COVID-19 by Shrikant Antre

[Webinar] Change in Red Team Assessment approach post COVID-19 by Shrikant Antre There are remarkable changes happening in the world due to the current pandemic […]

June 8, 2020January 20, 2025
0

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top