Cloud Security Guide for Government and Critical Infrastructure

By Hadi Hosn

July 1, 2020

Securing the Work-from-Home Arrangement

By Antoun Beyrouthy

April 14, 2020

Collaboration of the arch rivals

By Hadi Hosn

April 13, 2020

Blog

Secure the Code, Prevent the Breach.

By Antoun Beyrouthy

June 13, 2020

Finding Cyber Security Opportunities in Crisis. How Business Leaders Can Prepare Right Now

By Hadi Hosn

July 8, 2020

Hosting Anonymous Website on Tor Network

By Abed Samhuri

Aug 25, 2020

Installing a Windows Virtual Machine in a Linux Docker Container

By Abed Samhuri

July 20, 2020

The Basics of Cyber Threat Hunting

By Wafic Daya

May 1, 2020

Cybersecurity controls to implement before onboarding your team — Zoom

By Rani Haddad

April 8, 2020

REPORT AN INCIDENT

 

 SOLUTIONS

 

 SERVICES

5 Things to Look for When Buying a SOC as a Service

By Abed Samhuri

April 28, 2020

AMSI Evasion and LSASS Patch Bypassing to extract clear-text credentials with Mimikatz

By  Ali Salah

May 21, 2020

 

COMPANY

 

 SOLUTIONS

 

SERVICES

 

INSTITUTE

 

BLOG

 

CONTACT

Company

About Axon

Core Values

Leadership Team

SOC Solutions

Managed Detection

Intelligence-Led

ACFC

Challenges we solve

EDR+NDR

SOC-as-a-Service

Services for Splunk

Technology Partners

Services

Consulting Approach

Consulting Services

Institute

What is It?

Clients and Students

Individual Professionals

Organizations

Blog

Socials

© 2021 AXON Technologies