Start now

Trust in security with us

Cybersecurity is complex but it doesn’t have to be

Filter by

Checkmarx named ‘Black Unicorn’ award winner for establishing market leadership and vision in software security

Checkmarx named ‘Black Unicorn’ award winner for establishing market leadership and vision in software security

Checkmarx , the global leader in software security solutions for DevOps and strategic Ackcent partner for S-SDLC services, has been named a winner in Cyber Defense Magazine’s 2019 Black Unicorn Awards during Black Hat USA 2019 in Las Vegas

Duo Security enhanced MFA support for AWS

Duo Security enhanced MFA support for AWS

Cisco’s Duo Security, the leading multi-factor authentication (MFA) and Zero Trust for the Workforce provider, announced enhanced MFA support for Amazon Web Services (AWS).

What AI-Driven EDR can do for you

What AI-Driven EDR can do for you

The security professional’s job has become an endless game of cat-and-mouse, continually pursuing invisible attackers that can out-think, out-run and outsmart most security systems.

Dark Web 101: What every cybersecurity professional should know

Dark Web 101: What every cybersecurity professional should know

Turn on the nightly news or your favorite TV drama and you’re bound to hear mentions of a vast criminal underworld hidden in plain sight. All you need is a computer or mobile device to get there.

Checkmarx named a leader in Gartner Magic Quadrant for Application Security Testing

Checkmarx named a leader in Gartner Magic Quadrant for Application Security Testing

Checkmarx , the Software Exposure Platform for the enterprise, announced that it was named a Leader in Gartner’s 2019 analyst report, Magic Quadrant for Application Security Testing for the second consecutive year.

Execution – Powershell (T1086)

Execution – Powershell (T1086)

Powershell is a commandline interface (CLI) with command and scripting capabilities. Its main targets are System Administrators to automate task and control it.

The next generation of everything at Infosecurity

The next generation of everything at Infosecurity

Last week saw another edition of Europe’s largest cybersecurity event Infosecurity Europe , which Ackcent once again attended with a group of clients, together with some 20.000 professionals working in the sector.

Ackcent above and beyond in Spain with Stuart McClure, President and Founder at Cylance

Ackcent above and beyond in Spain with Stuart McClure, President and Founder at Cylance

Past May 30th, ISMS Forum , Spanish Association for the Promotion of Information Security, celebrated the 21st edition of the International Information Security Conference Cyber Risk Appetite in the new Digital Revolution

We are visiting Infosecurity Europe again this year!

We are visiting Infosecurity Europe again this year!

Next week, Ackcent will be returning to Infosecurity Europe in London for the fourth consecutive year.

Initial Access – Drive-by Compromise (T1189)

Initial Access – Drive-by Compromise (T1189)

This post is the first of a series of posts that will provide a better understanding about the techniques used by adversaries to reach their tactical objectives.

Basics- Linux Events Logging

Basics- Linux Events Logging

In this post we will cover the basics of Event Logging in Linux systems. We will talk about Syslog: Message structure, the most famous implementations and main configurations.

In-depth Freemarker Template Injection

In-depth Freemarker Template Injection

During a recent engagement, our AppSec team faced an interesting instance of limited Server Side Template Injection in Freemarker.