Using Cloud Infrastructure to Gain Privacy and Anonymity

| | cloud computing
Why would a security professional need anonymity? Anonymity and the need for privacy are often associated with suspicious or even criminal activity. For instance, in the Cyber Security sector, one of... Go on to the site to read the full article ... Read More

Secure Your Buckets

| | cloud computing
Cloud Storage When it comes to public cloud storage, traditional storage concepts such as hard disks and RAID arrays have been replaced by new, much more flexible options. Data stored within a cloud... Go on to the site to read the full article ... Read More

Controlling the Risks of Cloud-Enabled End-Point Security Products

| | cloud computing
Cloud Connectivity for End-point Security Products A relatively new feature in Antivirus products has led to an evolution of most traditional Antivirus products: Cloud connectivity. Many vendors such... Go on to the site to read the full article ... Read More
Deserialization Attacks for Crypto-Mining

Deserialization Attacks for Crypto-Mining

During the year 2017, an increased popularity in Deserialization Attack methods and a more than significant rise in the value of cryptocurrencies, some over 10 times their value compared to a year... Go on to the site to read the full article ... Read More
Security Considerations Surrounding CryptoMining as a Service

Security Considerations Surrounding CryptoMining as a Service

Virtual Currency Mining Undoubtedly, one of the more interesting news stories to follow over the last year has been the rise (and currently: the fall) of cryptocurrencies. Bitcoin, of course, is the... Go on to the site to read the full article ... Read More
Open Source IDS: Snort or Suricata?

Open Source IDS: Snort or Suricata?

Although early types of Network Intrusion Detection Systems go back all the way to the early 1980’s, the concept of IDS took off when Martin Roesch created his free and opensource IDS system... Go on to the site to read the full article ... Read More
SQL Injection Protection in Cloud Systems

SQL Injection Protection in Cloud Systems

SQL Injection Structural Query Language (SQL) is a language used to program and manage data in relational databases. Originating in 1986, SQL has gained so much popularity due to its practicality and... Go on to the site to read the full article ... Read More
Five Reasons Why Security Professionals Need the Cloud

Five Reasons Why Security Professionals Need the Cloud

| | cloud computing
Malware Analysis A more experienced security analyst or a threat intelligence analyst should be comfortable with malware research and even reverse engineering. This will not only provide valuable... Go on to the site to read the full article ... Read More
Insider threats within the cloud

Insider threats within the cloud

| | cloud computing
Contrary to common perception, time and time again reports show that the most significant security threats to an organization are the so-called Insider Threats. Research estimates hold these threats... Go on to the site to read the full article ... Read More
Kali Linux on AWS

Kali Linux on AWS

| | Penetration Testing
The need for Penetration Testing Every organization should have a security policy designed to fit its needs based on risks, threats, regulations and the value of the information it wants to protect.... Go on to the site to read the full article ... Read More
Loading...