877.791.9571 |

About the Author:

Scott Miller is a security researcher for the InfoSec Institute with experience in web application hacking, Linux security, and also network security. As a Linux administrator and open source advocate, Maher has worked in both higher education and the private sector with enterprise networks facing a variety of security challenges.

AAnval – SIEM by Tactical Flex

Aanval by Tactical Flex is an event correlation tool also known as a SIEM. Many governmental agencies require a centralized login system to retain and correlate logs from all […]


Wordfence: Security Plugin for WordPress

Wordfence is a free security plugin for WordPress. Security “plugins” for WordPress are often highly criticized as many may give a false sense of security or simply just automate […]


Drupal Security Notes

Drupal is one of the most popular free and open source web application frameworks. Drupal is almost infinitely extensible through not only various theme possibilities but also the vast […]


A Closer Look at WordPress Password Hashes

WordPress is one of the most popular open source web applications used by major Fortune 500 companies as well as many independent websites and blogs. Like many web applications, […]


In-Depth WordPress Security


Note: the following suggestions are at your own risk! This article assumes some level of understanding of what changes are being suggested.

WordPress is the most popular CMS used for […]


Firewall Security Testing

Testing firewall and IDS rules is a regular part of penetration testing or security auditing. However, because of the unique complexity involved of different environments, automated scanners are not […]


The Importance of Securing a Linux Web Server


With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server […]


Security Dangers of Web Management Interfaces

, ,

Web based interfaces are convenient for managing networking equipment, but under no circumstances should these be open to the world and the internet. Many networks alarmingly have their firewall, […]