Security Research

Blog

Articles on information security and cybersecurity by Clawhak – for practitioners and SME decision-makers.

Published on blog.clawhak.sh

13. Okt. 2025

Week 10: 16 Days Remaining —  How I’m Rescuing My Challenge from the Motivation Slump (An Honest…

Hey everyone!Continue reading on Medium »

Read on Medium

7. Okt. 2025

Comprehensive Bug Bounty Methodology Guide: Recon & Vulnerability Testing

This guide outlines a structured methodology for effective bug bounty hunting, combining automated reconnaissance with targeted manual…Continue reading on Medium »

Read on Medium

5. Okt. 2025

Week 9 of My 90-Day Challenge: Last-Minute Prep and New Burp Features

Hey everyone!Continue reading on Medium »

Read on Medium

29. Sept. 2025

Week 8 of My 90-Day Challenge: A Hot Lead and the BSCP Exam is Set

Hey everyone!Continue reading on Medium »

Read on Medium

21. Sept. 2025

Week 7 of My 90-Day Challenge: The Calm Before the Storm?

Hey everyone,Continue reading on Medium »

Read on Medium

15. Sept. 2025

Swiss IKT Minimal Standard vs. FISMA — A Transatlantic Comparison of Cybersecurity Frameworks

When it comes to securing government information systems and critical infrastructure, different nations have developed their own…Continue reading on Medium »

Read on Medium

15. Sept. 2025

ISO 27000 vs. BSI IT-Grundschutz — Which Framework for Your Information Security?

When it comes to establishing robust information security, organizations in Germany and beyond often face a choice between two prominent…Continue reading on Medium »

Read on Medium

15. Sept. 2025

ISO 27000 vs. NIST CSF — Which Framework is Right for Your Cybersecurity?

Choosing the right framework to manage information security risks is a critical decision for any organization. In a sea of guidelines and…Continue reading on Medium »

Read on Medium