Search this site
Embedded Files
Skip to main content
Skip to navigation
Amol Solutions
Home
Services
Insights
Sandboxing
OWASP ZAP
OWASP Juice Shop
Physical Security Policies
Static Code Checks for Security
Visual Studio Code
Blockchains 101
Vulnerable Dependency Checking
Network Segmentation & Discovery Scans
Painless Elastic History
TensorFlow 101
Cybersecurity Mindmap
Data Tagging FTW!
(EM+2)+=Service?
Asset Monitoring
About
Amol Solutions
Home
Services
Insights
Sandboxing
OWASP ZAP
OWASP Juice Shop
Physical Security Policies
Static Code Checks for Security
Visual Studio Code
Blockchains 101
Vulnerable Dependency Checking
Network Segmentation & Discovery Scans
Painless Elastic History
TensorFlow 101
Cybersecurity Mindmap
Data Tagging FTW!
(EM+2)+=Service?
Asset Monitoring
About
More
Home
Services
Insights
Sandboxing
OWASP ZAP
OWASP Juice Shop
Physical Security Policies
Static Code Checks for Security
Visual Studio Code
Blockchains 101
Vulnerable Dependency Checking
Network Segmentation & Discovery Scans
Painless Elastic History
TensorFlow 101
Cybersecurity Mindmap
Data Tagging FTW!
(EM+2)+=Service?
Asset Monitoring
About
Insights
2018
➤
Jul 09
Fearlessly run harmful applications to understand what they do!
➤
Jul 02
Learn to hack the Juice Shop further using an attack proxy!
➤
Jun 25
Learn to avoid vulnerabilities in your web applications by learning to penetration test.
➤
Jun 18
Don't overlook physical security best practices in your cybersecurity program!
➤
Jun 11
Are you validating if your code is secure at every build?
➤
Jun 04
A lightweight cross-platform modern code editor!
➤
May 28
Blockchains 101: In less than 50 lines of Java code!
➤
May 21
Would your build process alert you if you were using a known vulnerable dependency?
➤
May 14
Validating network segmentation with simple discovery scans.
➤
May 07
Efficiently maintain asset history at high scale with Elasticsearch!
➤
Apr 30
Y = MX + B
➤
Apr 23
Have you ever wondered why the world of cybersecurity is so complex?
➤
Apr 16
Do you need a framework to automate and centralize data policies?
➤
Apr 09
Frustrated at the end of your cybersecurity assessment?
➤
Apr 02
Would you know if a new asset showed up in your environment?
Report abuse
Report abuse