Data Security Considerations: Securely Migrating Critical Data to Microsoft 365
As digital environments become more and more central to business operations, the selection of software platforms is more critical than ever. But if you find yourself needing to migrate critical data to a new system, such as migrating to Microsoft ...
Read More about Data Security Considerations: Securely Migrating Critical Data to Microsoft 365
Show Filters
The tool WhatWeb needs to be added to any pen tester’s arsenal. WhatWeb is not a web vulnerabil...
How IAM Projects Fail: Three Traps, Part I
IAM (Identity and Access Management) projects have a history of unfortunate disasters to the tune...
Suricata Intrusion Detection and Prevention Engine 1.0.0 released
Suricata is a multi-threaded intrusion detection/prevention engine. This engine claims it is not ...
Read More about Suricata Intrusion Detection and Prevention Engine 1.0.0 released
[Security Scripts] Whois for Python
Whois.py is a script that makes it fast and easy to store Arin information about specific IPs. Th...
Three things to harden OpenSSH on Linux
The OpenSSH package comes installed on most Linux distributions; however, the default configurati...
Top 5 Business Benefits to an IAM Solution
From a technical perspective, it is easy to see why implementing an Identity and Access Managemen...
Using Insecure Protocols – FTP
Considering how security has evolved, it’s surprising that many companies still depend on old t...
Ask the PCI Ninja: PCI DSS 1.3.5 (Outbound Traffic)
The PCI Ninja is just like you, except he is a PCI SSC QSA and a CISSP. And hehas a ninja outfit....
Read More about Ask the PCI Ninja: PCI DSS 1.3.5 (Outbound Traffic)
Address Common Issues of your PCI Assessment
Part 2 – Logging Complying with PCI DSS logging and audit trail requirements can be very challe...
Read More about Address Common Issues of your PCI Assessment
Reducing PCI Scope for the Enterprise Merchant
Reducing PCI Scope for the Enterprise Merchant By definition, the scope of a cardholder data envi...
Read More about Reducing PCI Scope for the Enterprise Merchant
How to address the common stumbling blocks of your PCI Assessment – Encryption
Part 1 – Encryption Properly meeting the encryption related requirements for the PCI DSS can be...
Read More about How to address the common stumbling blocks of your PCI Assessment – Encryption
Undergoing a PCI Assessment – How to Prepare
Undergoing a PCI assessment can be a painful process. By taking steps to ensure yourorganization ...
Read More about Undergoing a PCI Assessment – How to Prepare
Adding SSL to Ubuntu / Apache2 / Ruby on Rails
There are many sources on Google for configuring SSL with Ubuntu, Apache2, and Ruby on Rails, but...
Read More about Adding SSL to Ubuntu / Apache2 / Ruby on Rails
Configuring Egress (Outbound) Rules with iptables (ubuntu style)
There is a lot of information on iptables (the Linux firewall) out there, but most of them focus ...
Read More about Configuring Egress (Outbound) Rules with iptables (ubuntu style)
Today it’s not if your organization will have an electronic incident it’s when will that inci...
Two Factor Authentication with OTP
What is Two factor authentication? “Something you have, and something you know.” Two Factor a...