Quantcast
Channel: Network – Security Compass
Browsing latest articles
Browse All 11 View Live

Image may be NSFW.
Clik here to view.

Porting the Gitorious installer from supporting only RedHat/Centos to support...

As our company grows we have started experiencing some pain points with using bare git repositories for our revision control. Compared to GitHub the following are the features that are most missed:...

View Article



Image may be NSFW.
Clik here to view.

Firewall, Router and Switch Configuration Review

The presentation provides a topical overview of the areas to be looked at when conducting a Firewall, Router, or Switch configuration review. This presentation is based on a slide deck I prepared for...

View Article

Image may be NSFW.
Clik here to view.

Is Your DDoS Mitigation Battle Tested?

The rising wave of DDoS attacks over the past twelve months have impacted many financial service organizations, in some cases costing them service downtime, productivity, brand reputation, falling...

View Article

Image may be NSFW.
Clik here to view.

A Flood Without Water

In today’s day and age people usually take on a lot more than they can handle. The first task is okay, the second gets a little harder, but as the third, fourth, fifth, and sixth start piling on one...

View Article

Image may be NSFW.
Clik here to view.

Mitigating Your Mitigation

The evolution of DDoS throughout 2015 has been unfolding at an alarming rate. Organizations that have DDoS mitigation solutions in place are not immune to these attacks, as each new attack evolves to...

View Article


Image may be NSFW.
Clik here to view.

Bad Sudo

Sudo allows admins to give users permissions to perform actions as other users, primarily the root user. Normally when you give a user sudo you limit the commands that they can run as to not give any...

View Article

Image may be NSFW.
Clik here to view.

Dynamic DDoS Defense

Figure 1: SDN blocking a malicious attack Intro Let’s face it, DDoS attacks are growing both in size and complexity. Botnets used to launch DDoS attacks can contain anywhere from hundreds of thousands...

View Article

Image may be NSFW.
Clik here to view.

DDoS – An Attacker’s Perspective

As you know, the evolution of Distributed Denial-of-Service (DDoS) attacks has many organizations scrambling to defend themselves. Even with defenses in place, a site is never truly protected until the...

View Article


Image may be NSFW.
Clik here to view.

FFIEC and DDoS Testing

DDoS has now secured itself a top 5 spot on most financial institutions’ list of security risks.  With a few exceptions out there, the question is no longer whether you have DDoS mitigation in place,...

View Article


Image may be NSFW.
Clik here to view.

What is an easy way to discover all of my external facing systems?

Problem: I’ve just taken over the Internal Security Engineer position at a company. We’ve never gone through a security audit before. We know which network ranges we own. However, we have no idea what...

View Article
Browsing latest articles
Browse All 11 View Live




Latest Images