Sometimes the passwords we think may be secure are not always the best choice that where I was told about the password meter tool @ .
This tool allows you to enter a password and with the click of a button make it more secure by entering characters based on best practices.
Hey All just a quick post on WordPress authentication keys You may have noticed that in the newer versions of WordPress that in the WP-config.php file there is a block of code asking for key[…]
Sysctl is a module built into linux that allows you to modify the kernel attributes in this example I am using. Sysctl to enable SYN-cookies an effective mitigation against SYN attacks. On your linux[…]
Auditing and checking your server to ensure that it is compliant based on your configuration and also ensuring total security is key. Many administrators get locked up with working on day to day tasks that[…]
Hello Everyone!, Sorry for being MIA its been crazy busy for me lately So sometimes I get asked how you can manage users on the UTM for things like the User Portal without creating local[…]
I posted some time ago about the benefits of using Cloudflare See my video below if you are not familiar with Cloudflare which is a cloud CDN/WAF Cloudflare provides a proxy between the internet[…]
If you have been hearing the news lately there has been a lot of media attention about Bitcoin. What is bitcoin ?, Bitcoin is a cryptocurrency that is digital and has no central body[…]
I have covered the importance of MFA(Multi Factor Authentication) aka 2 factor security with more and more vendors such as Gmail Outlook and others now supporting MFA there is no reason not to have it enabled.[…]
In my day to day Job, I have been responsible for mitigating DDoS attacks and making sure that they are detected in a timely manner. The company I work for has an awesome platform to[…]
A SYN attack is an exploit of the TCP/IP stack where by an attacker send SYN packets and suppresses the SYN -ACK packet. This type of attack can be Volumetric where by the attacker send[…]
The new wave of the internet is among us we are now in the era of IOT “Internet of things” sensors and devices that connect to the internet from home IP camera to your[…]
So it has been a few days since I was at the conference and I came across a few companies and products that I have not have the opportunity to see. One of the[…]
Its been and awesome day at the Toronto Tech Security Conference. I got to speak with alot of vendors and see some of the new stuff that is on the market. It is always good[…]
With the blow up in big data and the ease of use of big data related tools such as Splunk organizations are better empowered to track trends from devices and systems that were previously tedious[…]
Hello everyone, In this video I show you how to configure application control on the Sophos UTM appliance Application control allows you to slow down or block traffic from a specific application to control network[…]