Show Filters
Filtering by Resource Type: Blog
10 Essential Baseline Security Hardening Considerations for Windows Server 2016
Increase your Windows server security by enabling the following features and configurations. Whil...
Read More about 10 Essential Baseline Security Hardening Considerations for Windows Server 2016
3 Steps to Implementing Your Public Key Infrastructure (PKI) Architecture
Setting up a public key infrastructure helps you manage digital security certificates, encryption...
Read More about 3 Steps to Implementing Your Public Key Infrastructure (PKI) Architecture
BackTrack 6 replaced by Kali Linux 1.0
BackTrack is dead. Long live Kali Linux. Since 2006, Offensive Security has developed and distr...
Tracking Days Since the Last Java 0-day Vulnerability
Following the discovery of a brand-new Java zero-day vulnerability by FireEye on Februa...
Read More about Tracking Days Since the Last Java 0-day Vulnerability
Encrypt Your Secrets with a Deck of Cards
Bruce Schneier, an American cryptographer and security expert, created the Solitaire cryptographi...
Resuscitating John the Ripper for SHA-512
John the Ripper (http://www.openwall.com/john) is a well-known and mature password auditing tool....
Tevora’s Tokenization & Data Field Encryption
Ray Zadjmool in ISSA Journal Lake Forest, CA – November 2010 – Principal Consu...
Read More about Tevora’s Tokenization & Data Field Encryption
How to Parse Firewall Configs with Nipper.
Who said analyzing firewalls and network devices was something tedious and cumbersome? Well your ...
Virtualization, Security & Compliance and How They Can Exist Together
There is no doubt that virtualization is the hot trend right now. Many companies are beginning th...
Read More about Virtualization, Security & Compliance and How They Can Exist Together
Ever get to an authentication challenge in a client application and have that feeling of being ro...