how to - Tagged - Security Boulevard
risk management register

Why A Risk Register Is Important for Cybersecurity Leaders

If you’re not yet using a risk register, you’re putting your company at, well, risk. The world of commerce is full of dangers, traps, pitfalls and potential risks that can sink a ...
Security Boulevard

Custom Node Module Management using Private npm Registry Configured in Nexus Repository

When we are developing software applications, we design reusable components to apply the power and benefit of reuse. Reuse is still an emerging discipline. It appears in many different forms from ad-hoc ...
How to Block the “Sindhi Text Bomb” on iOS

How to Block the “Sindhi Text Bomb” on iOS

Apple has made quite a few headlines these past couple of days, including one of a particularly annoying – and potentially dangerous – crashing bug. The Sindhi “text bomb,” as it’s come ...
New Phishing Scam Lures iPhone Owners with Romantic Chat, Gambling, ‘Free’ VPN

New Phishing Scam Lures iPhone Owners with Romantic Chat, Gambling, ‘Free’ VPN

Bitdefender this week has detected a new phishing campaign targeting iPhone owners with a range of scams aiming to defraud unsuspecting victims. First things first. If you receive the email pictured below, ...

Four Steps to Get Started with Nexus Repository Using New REST APIs

Nexus Repository Manager (NXRM) has new supported REST API endpoints that can automate your binary management needs. REST APIs allow clients to interact with an application, providing them with the capabilities of ...

IntelliJ and Vulnerability Search with Nexus Lifecycle

In this episode of DevSecOps Delivered we walk through how to get immediate feedback from IntelliJ during an open source vulnerability search. We show how Nexus Lifecycle offers immediate remediation when a ...
Raspberry Pi 4 Model B running PolarProxy

Raspberry PI WiFi Access Point with TLS Inspection

This is a how-to guide for setting up a Raspberry Pi as a WiFi Access Point, which acts as a transparent TLS proxy and saves the decrypted traffic in PCAP files. Image: ...
How to set up a DNS Server

How to set up a DNS Server

A complete guide to spinning up your own DNS server. Odds are, if you have a computer and you find yourself on the interwebs Googling away, you have heard the... The post ...
‘Your account has been locked’ – 7 telltale signs of a phishing scam

‘Your account has been locked’ – 7 telltale signs of a phishing scam

According to study after study, phishing remains the most efficient attack vector for bad actors to steal your data. Even though attackers have plenty of options, they prefer phishing because it does ...
Imperva Cloud WAF and Graylog, Part II: How to Collect and Ingest SIEM Logs

Imperva Cloud WAF and Graylog, Part II: How to Collect and Ingest SIEM Logs

This guide gives step-by-step guidance on how to collect and parse Imperva Cloud Web Application Firewall (WAF, formerly Incapsula) logs into the Graylog SIEM tool. Read Part I to learn how to ...

Techstrong Group