Blog
Winmill Blogs
Cloud
When is it Appropriate to Implement a Serverless Architecture?April 21, 2023 What is Serverless?
December 20, 2022 Migrating Legacy Applications to the Cloud: Four Viable Approaches
February 25, 2022 The Benefits of a Serverless Architecture
September 1, 2021 DevOps vs. CloudOps
July 5, 2021
Cyber Security
Come check out Ben DiMolfetta at SecureWorld Houston on May 18, 2023May 4, 2023 Top Penetration Testing Certifications to Boost Your Cybersecurity Career
April 30, 2023 Enhancing SOC Assessments with MITRE ATT&CK
April 20, 2023 The Social Engineer’s Toolkit (SET)
April 4, 2023 Kali Purple: A First Look at Kali Linux for Blue and Purple Teams
March 27, 2023 Beyond alert(“XSS”): Advanced Client-Side Penetration Testing with the Browser Exploitation Framework
March 22, 2023 Pen Tester’s Notebook – Part 1 – Formatting Nmap Results
December 14, 2022 Current Trends in Penetration Testing: the Impact of Changing Expectations
December 5, 2022 The MITRE ATT&CK Defender Framework: Intelligence-Driven Threat Modeling
November 23, 2022 Penetration Testing: What You Need to Know
November 15, 2022 Winmill Shares Its Accomplishments In The Micro Focus Sales Enablement Competition
November 10, 2022 Winmill Wins 2022 Apex Program Contest
November 1, 2022 Conducting Penetration Testing: 7 Steps
October 24, 2022 Is it Possible to Automate Penetration Testing?
October 13, 2022 Application Scan Identifies an SSRF Vulnerability; Penetration Test Finds Exploitation Attack Vectors
September 7, 2022 Padding Oracle Attack: Are You Vulnerable?
August 5, 2022 Low-Tech Cyber Security Threat Hunting with Bash
July 19, 2022 Winmill Employee Wins Veracode Video Contest
July 12, 2022 Veracode SCA Video Series
July 7, 2022 Cyber Security: Microsoft Office/Microsoft Support Diagnostic Tool “Follina” Vulnerability
June 23, 2022 Cyber Security: Hardened Windows Server 2016 Breached via Web Apps
June 8, 2022 Penetration Test: SYSTEM Access to MSSQL Server via SQL Injection and File Overwrite
May 3, 2022 External Pen Test Breaches Company’s Perimeter Via WordPress
March 3, 2022 Review: 4 Popular Vulnerability Aggregation Tools
February 8, 2022 How to Test Your Own Vulnerability to the Log4Shell Attack Chain in Apache Solr
December 27, 2021 Gaining system admin control in minutes, via the default credentials in Manage Engine
December 8, 2021 Penetration test reveals a vulnerability in a very popular open-source web app component: Apache Struts
November 16, 2021 Blog of a Penetration Tester: Issue 2 – Anatomy of an Effective Penetration Test Report
November 11, 2021 Blog of a Penetration Tester: Article 2 – Unique Demands of the Role
October 29, 2021 Penetration Testing vs. Vulnerability Scanning
October 5, 2021 Blog of a Penetration Tester: Article 1 – Some Important Definitions
September 28, 2021 7 Reasons Why You Need Penetration Testing
September 15, 2021 5 Best Practices to Prevent Ransomware Attacks
August 24, 2021 Winmill Cyber Security Webinar
July 7, 2021 Application Penetration Testing for Compliance: The Nine Most Common Standards
July 2, 2021
DevOps
What is Serverless?December 20, 2022 Migrating Legacy Applications to the Cloud: Four Viable Approaches
February 25, 2022 Breaking Down a Serverless Architecture: The Back End
December 28, 2021 Breaking Down Serverless Architecture: The Middle Tier
October 29, 2021 Breaking Down Serverless Architecture: The Front End
September 24, 2021 The Benefits of a Serverless Architecture
September 1, 2021 DevOps vs. CloudOps
July 5, 2021
Software Development
When is it Appropriate to Implement a Serverless Architecture?April 21, 2023

































Interested in starting a project with us?
Let's Talk© 2023 Winmill Software. All Rights Reserved. Read Our Privacy Policy.