General security January 7, 2021 Pedro Tavares Installing and configuring CentOS 8 on Virtualbox [updated 2021] Unix-based operating systems are ruling the webserver OS market. According to data from W3techs, in 2017 Unix servers were used by 66.5% of all the websites,...
General security December 23, 2020 Kurt Ellzey Top 6 JavaScript plugin security risks If you're on the web for more than about two hours, there's a good chance that you'll hear someone use the word “analytics.” This does not necessarily...
General security December 22, 2020 Dan Virgillito Security tool investments: Complexity vs. practicality As cyber threats rise, there has been a rush of security vendors offering tools to prevent data breaches. Today, security professionals can invest in a variety...
General security November 9, 2020 Susan Morrow Data breach vs. data misuse: Reducing business risk with good data tracking Imagine this, and let’s face it, this isn't too hard: your personal data, including financial information, has been stolen in a major data breach. You’d...
General security October 29, 2020 Dan Virgillito Key findings from the 2020 Netwrix IT Trends report In today’s rapidly changing technological landscape, failing to keep up with trends can make your company lag behind. 2020’s IT trends have been influenced...
General security October 28, 2020 Kurt Ellzey Fake Image Detection This is a frying pan. This is a frying pan with a badly drawn pair of eggs in it. Any questions? The phrase “X has been Photoshopped”...
General security October 22, 2020 Susan Morrow Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy I’ve been writing cybersecurity articles for many years, and in that time, I have only seen increasingly complex security threats. Cybercriminals take their...
General security October 20, 2020 David Bisson Implementing a zero-trust model: The key to securing microservices Organizations are increasingly integrating microservices into their software development processes. As noted by DZone, microservices break down software into...
General security October 14, 2020 Pedro Tavares How to create a subdomain enumeration toolkit A domain name is an important part of the reconnaissance process during a security assessment or even for many bug bounty challenges. In this article, we’ll...
General security October 6, 2020 Claudio Dodt Are open-source security tools secure? Weighing the pros and cons There is a myth that good security solutions are necessarily expensive, but the truth is that there are many options, not only at low cost, but even excellent...